wative 1.1.20 → 1.2.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/lib/wative.umd.js CHANGED
@@ -1 +1 @@
1
- !function(e,t){"object"==typeof exports&&"undefined"!=typeof module?t(exports,require("path"),require("commander"),require("child_process"),require("fs"),require("ini"),require("crypto"),require("ssh2"),require("figlet"),require("inquirer"),require("web3"),require("@solana/web3.js"),require("@solana/spl-token"),require("@metaplex-foundation/js"),require("bignumber.js"),require("log4js"),require("ethers"),require("tweetnacl"),require("bs58"),require("bip39"),require("@coral-xyz/anchor"),require("crypto-js"),require("ethereumjs-wallet"),require("micro-ed25519-hdkey"),require("net")):"function"==typeof define&&define.amd?define(["exports","path","commander","child_process","fs","ini","crypto","ssh2","figlet","inquirer","web3","@solana/web3.js","@solana/spl-token","@metaplex-foundation/js","bignumber.js","log4js","ethers","tweetnacl","bs58","bip39","@coral-xyz/anchor","crypto-js","ethereumjs-wallet","micro-ed25519-hdkey","net"],t):t((e="undefined"!=typeof globalThis?globalThis:e||self).demo={},e.path,e.commander,e.child_process,e.fs,e.ini,e.crypto,e.ssh2,null,e.inquirer,e.Web3,e.require$$6,null,null,null,e.log4js,e.ethers,e.require$$3,e.require$$4,e.require$$5,e.require$$7,e.require$$8,e.require$$9,e.require$$10,e.net)}(this,function(e,t,r,s,o,n,i,a,c,l,u,p,d,h,g,f,m,y,v,w,b,S,k,x,_){"use strict";function P(e){return e&&"object"==typeof e&&"default"in e?e:{default:e}}function j(e){if(e&&e.__esModule)return e;var t=Object.create(null);return e&&Object.keys(e).forEach(function(r){if("default"!==r){var s=Object.getOwnPropertyDescriptor(e,r);Object.defineProperty(t,r,s.get?s:{enumerable:!0,get:function(){return e[r]}})}}),t.default=e,Object.freeze(t)}var $=j(t),E=P(t),I=j(o),A=P(o),C=j(n),q=j(i),T=P(l),O=P(u),K=P(p),M=j(f),D=P(y),L=P(v),H=P(w),z=P(b),N=P(S),R=P(k),F=P(x),B=j(_);class W{constructor(e,t){this.configDir=e||$.join(require("os").homedir(),".wative/ssh"),this.keystorePath=t||$.join(require("os").homedir(),".wative"),I.existsSync(this.configDir)||I.mkdirSync(this.configDir,{recursive:!0});const r=$.join(this.configDir,"conf.d");I.existsSync(r)||I.mkdirSync(r,{recursive:!0})}getKeystorePath(){return this.keystorePath}getConfigDir(){return this.configDir}async createServiceConfig(e,t,r,s="default_client",o){if(!this.isValidServiceName(e))throw new Error("Invalid service name. Use only alphanumeric characters, hyphens, and underscores.");if(this.isPortInUse(t))throw new Error(`Port ${t} is already in use by another service.`);const n=await this.generateServiceKeyPair(e),i=await this.generateClientKeyPair(e,s),a={name:e,description:o||`Wative SSH Service - ${e}`,ssh:{listen:"127.0.0.1",port:t,log:{size:10485760,backups:3}},keystore:{path:this.keystorePath,allowed_keystores:r},clients:[{name:s,public_key_path:i.publicKey,allowed_keystores:r}],server_keys:{private_key_path:n.privateKey,passphrase:n.passphrase}};return this.saveServiceConfig(e,a),a}loadServiceConfig(e){const t=this.getServiceConfigPath(e);if(!I.existsSync(t))throw new Error(`Service configuration '${e}' not found.`);const r=C.parse(I.readFileSync(t,"utf-8"));return this.parseConfigData(r)}listServiceConfigs(){const e=$.join(this.configDir,"conf.d");if(!I.existsSync(e))return[];return I.readdirSync(e).filter(t=>{const r=$.join(e,t);return I.statSync(r).isDirectory()&&I.existsSync($.join(r,"config.ini"))})}removeServiceConfig(e){const t=this.getServiceConfigPath(e);I.existsSync(t)&&I.unlinkSync(t),this.removeServiceKeys(e)}updateServiceConfig(e,t){const r={...this.loadServiceConfig(e),...t};this.saveServiceConfig(e,r)}async validateKeystorePasswords(e,t){const r={},{WativeCore:s}=require("wative-core");for(const o of e)try{const e=t[o];if(!e){r[o]=!1;continue}const n=new s(this.keystorePath,[o],[e]);r[o]=n.account.isLogin(o)}catch(e){r[o]=!1}return r}isValidServiceName(e){return/^[a-zA-Z0-9_-]+$/.test(e)&&e.length>0&&e.length<=50}isPortInUse(e){const t=this.listServiceConfigs();for(const r of t)try{if(this.loadServiceConfig(r).ssh.port===e)return!0}catch(e){}return!1}async generateServiceKeyPair(e){const t=this.generateSecurePassphrase(),r=$.join(this.configDir,"conf.d",e);I.existsSync(r)||I.mkdirSync(r,{recursive:!0});const o=$.join(r,"server_private_key"),n=$.join(r,"server_public_key.pub");return I.existsSync(o)||(console.log(`Generating SSH server key pair for service '${e}'...`),s.execSync(`ssh-keygen -t rsa -b 4096 -f ${o} -N '${t}' -C 'wative_${e}_server'`,{stdio:"inherit"})),{privateKey:o,publicKey:n,passphrase:t}}async generateClientKeyPair(e,t){const r=$.join(this.configDir,"conf.d",e);I.existsSync(r)||I.mkdirSync(r,{recursive:!0});return{privateKey:"",publicKey:$.join(r,`${t}.pub`),passphrase:""}}generateSecurePassphrase(){return q.randomBytes(32).toString("hex")}getServiceConfigPath(e){return $.join(this.configDir,"conf.d",e,"config.ini")}saveServiceConfig(e,t){const r=this.getServiceConfigPath(e),s=$.dirname(r);I.existsSync(s)||I.mkdirSync(s,{recursive:!0});const o=C.stringify(t);I.writeFileSync(r,o)}parseConfigData(e){return{name:e.name,description:e.description,ssh:{listen:e.ssh.listen,port:parseInt(e.ssh.port),log:{size:parseInt(e.ssh.log.size),backups:parseInt(e.ssh.log.backups)}},keystore:{path:e.keystore.path,allowed_keystores:Array.isArray(e.keystore.allowed_keystores)?e.keystore.allowed_keystores:e.keystore.allowed_keystores.split(",")},clients:Array.isArray(e.clients)?e.clients:[e.clients],server_keys:{private_key_path:e.server_keys.private_key_path,passphrase:e.server_keys.passphrase}}}removeServiceKeys(e){const t=[`id_rsa_${e}_server`,`id_rsa_${e}_server.pub`,`id_rsa_${e}_*`];for(const e of t){const t=$.join(this.configDir,e);I.existsSync(t)&&I.unlinkSync(t)}}}require("chalk"),require("chalk"),require("chalk"),process.env.HOME||process.env.USERPROFILE;const U=async e=>{const t=[{name:"password",type:"password",mask:"#",message:`${e}:`}];let{password:r}=await T.default.prompt(t);return r};require("bn.js"),require("ethereumjs-util"),require("bignumber.js"),require("chalk"),require("wative-core"),require("chalk"),require("dotenv").config(),require("cli-progress"),require("wative-core");const{WativeCore:G}=require("wative-core"),{Connection:J,PublicKey:V,VersionedTransaction:Z,VersionedMessage:Q}=require("@solana/web3.js"),Y=require("bs58"),{Keypair:X,TransactionMessage:ee,ComputeBudgetInstruction:te,TransactionInstruction:re,ComputeBudgetProgram:se}=require("@solana/web3.js"),{Wallet:oe}=require("@coral-xyz/anchor");M.configure({appenders:{file:{type:"file",filename:process.env.HOME+"/.wative/logs/wative.log",maxLogSize:10485760,backups:3,compress:!0,keepFileExt:!0,layout:{type:"pattern",pattern:"%d{yyyy-MM-dd hh:mm:ss.SSS} [%p] %c - %m"},encoding:"utf-8"},console:{type:"console"}},categories:{default:{appenders:["file","console"],level:"info"}}});const ne=M.getLogger("file");ne.level="info";class ie{constructor(e,t,r,s,n,i,c,l){if(this._allowedAppIds=[],this._allowedPubKeys=[],this._allowedKeystoreIds=[],this._sessionIdAppIdMap={},(e=>{if(e=e.trim(),!I.existsSync(e))throw new Error("File not exists")})(e),0===r.length||0===s.length||0===n.length||r.length!==s.length||r.length!==n.length)throw new Error("WativeWielderServer:: constructor: Invaild AllowedApp");for(let e=0;e<n.length;e++)for(let t=0;t<n[e].length;t++){const r=n[e][t];if(!c.includes(r))throw new Error("WativeWielderServer:: constructor: Invaild AllowedKeystoreIds")}for(let e of r)this._allowedAppIds.push(Buffer.from(e));for(let e of s){let t=a.utils.parseKey(o.readFileSync(e));this._allowedPubKeys.push(t)}this.wativeCore=new G(i,c,l),this._idRsaPrivatePath=e,this._idRsaPassphrase=t,this._allowedKeystoreIds=n,this._keystoreDirectoryPath=i}listen(e,t){new a.Server({hostKeys:[{key:o.readFileSync(this._idRsaPrivatePath),passphrase:this._idRsaPassphrase}]},e=>{e.on("authentication",t=>{let r=!0;if(this&&(this.checkValue(Buffer.from(t.username),"appId")||(r=!1)),"publickey"!==t.method||!r)return t.reject();{let e=this.getBytesIndex(Buffer.from(t.username),this._allowedAppIds),r=this._allowedPubKeys[e];if(t.key.algo!==r.type||!this.checkValue(t.key.data,"publicKey")||t.signature&&!0!==r.verify(t.blob,t.signature,t.hashAlgo))return t.reject()}if(r){const r=e._protocol._kex.sessionID.toString("hex");this._sessionIdAppIdMap[r]=Buffer.from(t.username),t.accept()}else t.reject()}).on("ready",()=>{e.on("session",(t,r)=>{t().once("exec",async(t,r,s)=>{const o=e._protocol._kex.sessionID.toString("hex"),n=await this.web3Request(o,s.command),i=t();i&&(JSON.stringify(n)?(i.write(JSON.stringify(n)),i.exit(0),i.end()):(i.write("ssh2 connect error"),i.exit(0),i.end()))})})}).on("close",()=>{ne.info("Client disconnected")}).on("error",e=>{ne.error("err: ",e.message)})}).listen(t,e,function(){ne.info("Listening on port "+t)})}async web3Request(e,t){try{const r=this._sessionIdAppIdMap[e],s=this.getBytesIndex(r,this._allowedAppIds);if(s<0)return{status:!1,msg:"app not found"};let o=JSON.parse(t);ne.info("sign message: ",t);let n=o.method,i=o.keystoreId||o.params.keystoreId,a=o.chainId||o.params.chainId;if(!this._allowedKeystoreIds[s].includes(i))return{status:!1,msg:"keystore not allowed"};let c;if("get_root_account"===n)c=this.getRootAccount(i,a);else if("get_sub_account"===n){let e=o.params;c=this.getSubAccount(i,e.chainId,null==e?void 0:e.startIndex,null==e?void 0:e.endIndex)}else if("sign"===n){let e=o.params;try{c=await this.wativeCore.account.signTransaction(e.txParams.from,e.txParams,e.rpcUrl)}catch(e){return ne.error("sign error: ",e.message),{status:!1,msg:e.msg}}}else if("sign_and_send"===n){let e=o.params;try{c={transactionHash:await this.wativeCore.account.signAndSendTx(e.txParams,e.rpcUrl)}}catch(e){return{status:!1,msg:e.msg}}}else if("solana_sign"===n)try{let e=o.params;c=await this.signSolanaTransaction(e.txParams.from,e.txParams.data,e.txParams.lookup_tables,e.rpcUrl,e.priority_fee)}catch(e){return ne.error("sign error: ",e.message),{status:!1,msg:e.msg}}else if("solana_send"===n)try{let e=o.params;c=await this.sendSignedSolanaTransaction(e.txParams.from,e.txParams.signature,e.txParams.data,e.rpcUrl)}catch(e){return ne.error("sign error: ",e.message),{status:!1,msg:e.msg}}else if("sign_message"===n)try{let e=o.params;ne.debug("sign message: ",e),c=await this.signMessage(e.account,e.message)}catch(e){return ne.error("sign error: ",e.message),{status:!1,msg:e.msg}}else{if("sign_typed_data"!==n)return{status:!1,msg:"message method not find"};try{let e=o.params;ne.debug("sign message: ",e),c=await this.signTypedData(e.account,e.domain,e.types_name,e.types,e.message)}catch(e){return ne.error("sign error: ",e.message),{status:!1,msg:e.msg}}}return{status:!0,data:c}}catch(e){return ne.error("sign error: ",e.message),{status:!1,msg:e.msg}}}checkValue(e,t){if("appId"!==t&&"publicKey"!==t)return!1;let r=this._allowedAppIds.length;for(let s=0;s<r;s++){let r;r="appId"===t?this._allowedAppIds[s]:this._allowedPubKeys[s].getPublicSSH();const o=e.length!==r.length;o&&(r=e);const n=i.timingSafeEqual(e,r);if(!o&&n)return!0}}getBytesIndex(e,t){let r=t.length;for(let s=0;s<r;s++)if(e.length===t[s].length&&i.timingSafeEqual(e,t[s]))return s;return-1}getRootAccount(e,t){const r=$.resolve(this._keystoreDirectoryPath,`accounts/${e}.json`);let s,n=o.readFileSync(r);return n=JSON.parse(n.toString()),s="SOLANA"===this.getChainType(t)?n.data[0].ciphertexts.solana.address:n.data[0].ciphertexts.evm.address,[{id:0,address:s,children:n.data.length,type:"M"}]}getChainType(e){return"901"===e||"902"===e||"903"===e?"SOLANA":"EVM"}getSubAccount(e,t,r,s){const n=$.resolve(this._keystoreDirectoryPath,`accounts/${e}.json`);let i=o.readFileSync(n);i=JSON.parse(i.toString());let a=i.data.length-1;s&&s<a&&(a=s);let c=0;if(r&&r>0&&(c=r),c>a)return[];let l=this.getChainType(t),u=[];for(let e=c;e<=a;e++)u.push(i.data[e].ciphertexts[l.toLocaleLowerCase()].address);return u}async signMessage(e,t){let r=await this.wativeCore.account.signMessage(e,t);return console.log(r),r}async signTypedData(e,t,r,s,o){let n=JSON.parse(t),i=JSON.parse(s),a=JSON.parse(o);console.log(n),console.log(i),console.log(a);let c=this.wativeCore.account.showPrivateKey(e),l=new m.ethers.Wallet(c),u=await l.signTypedData(n,{[r]:i},a);return console.log(u),{status:!0,output:u}}async signSolanaTransaction(e,t,r,s,o){let n=new J(s),i=[];if(r)for(let e of r){let t=(await n.getAddressLookupTable(new V(e))).value;i.push(t),await ae(1e3)}let a=Q.deserialize(Uint8Array.from(Buffer.from(t,"hex"))),c=ee.decompile(a);c.instructions.push(se.setComputeUnitLimit({units:2e6})),c.instructions.push(se.setComputeUnitPrice({microLamports:1e3})),a=c.compileToV0Message(i),a.recentBlockhash=(await n.getLatestBlockhash()).blockhash,await ae(3e3);let l=new Z(a),u=this.wativeCore.account.showPrivateKey(e);const p=X.fromSecretKey(new Uint8Array(Y.decode(u))),d=new oe(p);let h=await n.simulateTransaction(l);if(!h||!h.value||0===h.value.unitsConsumed||h.value.err)return{status:!1,output:h.value.err};let g=c.instructions.length,f=Math.trunc(1.2*h.value.unitsConsumed);if(c.instructions[g-2]=se.setComputeUnitLimit({units:f}),!o||"null"==o)try{o=await this.getPrioritizationFee(s)}catch(e){o=2e5}o<1e4&&(o=1e4),o>5e5&&(o=5e5),c.instructions[g-1]=se.setComputeUnitPrice({microLamports:o}),a=c.compileToV0Message(i),await ae(1e3),a.recentBlockhash=(await n.getLatestBlockhash()).blockhash,l=new Z(a),l.feePayer=d.publicKey,await ae(3e3);let m=await this.wativeCore.account.signTransaction(e,l,s),y=new Z(m.output.message,m.output.signatures).message.serialize();return y=Buffer.from(y).toString("hex"),{status:!0,output:{transactionHash:Y.encode(m.output.signatures[0]),message:y,compute_units:h.value.unitsConsumed.toString()}}}async sendSignedSolanaTransaction(e,t,r,s){let o=[Y.decode(t)],n=Q.deserialize(Uint8Array.from(Buffer.from(r,"hex"))),i=new Z(n,o);return await this.wativeCore.account.sendSignedTransaction(e,i,s)}async getPrioritizationFee(e){let t=new V("JUP6LkbZbjS1jKKwapdHNy74zcZ3tLUZoi5QNyVTaV4");const r=new J(e,"confirmed");let s=await r.getSignaturesForAddress(t,{limit:5});await ae(2e3);let o=[];for(let e=0;e<s.length;e++)o.push(s[e].signature);let n=await r.getParsedTransactions(o,{maxSupportedTransactionVersion:0}),i=0;for(let e=0;e<n.length;e++){let t=n[e].transaction.message.instructions;for(let e=0;e<t.length;e++)if("ComputeBudget111111111111111111111111111111"===t[e].programId.toBase58()){let r=t[e].data;try{let e=new re({keys:[],programId:new V("ComputeBudget111111111111111111111111111111"),data:Buffer.from(Y.decode(r))}),{microLamports:t}=te.decodeSetComputeUnitPrice(e);i+=Number(t);continue}catch(e){}}}return Math.ceil(i/5)}}const ae=e=>new Promise(t=>setTimeout(t,e));"undefined"!=typeof globalThis?globalThis:"undefined"!=typeof window?window:"undefined"!=typeof global?global:"undefined"!=typeof self&&self;var ce={exports:{}},le={name:"wative-core",version:"1.0.21",description:"An agile keystore management toolkit",main:"lib/index.umd.js",module:"lib/index.esm.js",types:"lib/index.d.ts",scripts:{test:"jest",compile:"tsc",build:"rollup --config"},repository:{type:"git",url:""},bugs:{url:"https://github.com"},homepage:"https://github.com",keywords:["keystore","wallet"],author:"",license:"ISC",files:["src/","lib/"],dependencies:{"@babel/plugin-transform-modules-commonjs":"7.24.1","@rollup/plugin-commonjs":"21.0.1","@solana/web3.js":"1.91.8","@types/bs58":"4.0.4","crypto-js":"4.2.0","ethereumjs-wallet":"1.0.2",jest:"27.5.1","micro-ed25519-hdkey":"0.1.2",rollup:"2.79.1","rollup-plugin-terser":"7.0.2","rollup-plugin-typescript2":"0.31.2",tslib:"2.6.2",typescript:"4.9.5",web3:"1.7.3","web3-core":"4.3.2","@coral-xyz/anchor":"0.30.1","@types/crypto-js":"4.2.2","nodejs-threadpool":"1.0.1",tweetnacl:"1.0.3","rpc-websockets":"7.10.0"}};!function(e,t){!function(e,t,r,s,o,n,i,a,c,l,u,p){function d(e){return e&&"object"==typeof e&&"default"in e?e:{default:e}}function h(e){if(e&&e.__esModule)return e;var t=Object.create(null);return e&&Object.keys(e).forEach(function(r){if("default"!==r){var s=Object.getOwnPropertyDescriptor(e,r);Object.defineProperty(t,r,s.get?s:{enumerable:!0,get:function(){return e[r]}})}}),t.default=e,Object.freeze(t)}var g=h(t),f=h(r),m=d(s),y=h(o),v=h(n),w=h(i),b=h(l),S=function(){return S=Object.assign||function(e){for(var t,r=1,s=arguments.length;r<s;r++)for(var o in t=arguments[r])Object.prototype.hasOwnProperty.call(t,o)&&(e[o]=t[o]);return e},S.apply(this,arguments)};function k(e,t,r,s){return new(r||(r=Promise))(function(o,n){function i(e){try{c(s.next(e))}catch(e){n(e)}}function a(e){try{c(s.throw(e))}catch(e){n(e)}}function c(e){var t;e.done?o(e.value):(t=e.value,t instanceof r?t:new r(function(e){e(t)})).then(i,a)}c((s=s.apply(e,t||[])).next())})}function x(e,t){var r,s,o,n={label:0,sent:function(){if(1&o[0])throw o[1];return o[1]},trys:[],ops:[]},i=Object.create(("function"==typeof Iterator?Iterator:Object).prototype);return i.next=a(0),i.throw=a(1),i.return=a(2),"function"==typeof Symbol&&(i[Symbol.iterator]=function(){return this}),i;function a(a){return function(c){return function(a){if(r)throw new TypeError("Generator is already executing.");for(;i&&(i=0,a[0]&&(n=0)),n;)try{if(r=1,s&&(o=2&a[0]?s.return:a[0]?s.throw||((o=s.return)&&o.call(s),0):s.next)&&!(o=o.call(s,a[1])).done)return o;switch(s=0,o&&(a=[2&a[0],o.value]),a[0]){case 0:case 1:o=a;break;case 4:return n.label++,{value:a[1],done:!1};case 5:n.label++,s=a[1],a=[0];continue;case 7:a=n.ops.pop(),n.trys.pop();continue;default:if(!((o=(o=n.trys).length>0&&o[o.length-1])||6!==a[0]&&2!==a[0])){n=0;continue}if(3===a[0]&&(!o||a[1]>o[0]&&a[1]<o[3])){n.label=a[1];break}if(6===a[0]&&n.label<o[1]){n.label=o[1],o=a;break}if(o&&n.label<o[2]){n.label=o[2],n.ops.push(a);break}o[2]&&n.ops.pop(),n.trys.pop();continue}a=t.call(e,n)}catch(e){a=[6,e],s=0}finally{r=o=0}if(5&a[0])throw a[1];return{value:a[0]?a[1]:void 0,done:!0}}([a,c])}}}"function"==typeof SuppressedError&&SuppressedError;var _=function(e,t){return k(void 0,void 0,void 0,function(){var r,s,o;return x(this,function(n){switch(n.label){case 0:return n.trys.push([0,2,,3]),[4,e.apply(void 0,t)];case 1:return s=n.sent(),r={status:!0,output:s},[3,3];case 2:return o=n.sent(),r={status:!1,output:o.toString()},[3,3];case 3:return[2,r]}})})},P=function(){function e(e){this.web3=new m.default(e)}return e.prototype.getEvmGasPrice=function(){return k(this,void 0,void 0,function(){return x(this,function(e){switch(e.label){case 0:return[4,_(this.web3.eth.getGasPrice,[])];case 1:return[2,e.sent()]}})})},e.prototype.getEvmGasLimit=function(e,t){return k(this,void 0,void 0,function(){return x(this,function(r){switch(r.label){case 0:return[4,_(this.web3.eth.estimateGas,[e,t])];case 1:return[2,r.sent()]}})})},e}(),j=function(e){return e=e.trim(),g.existsSync(e)},$=function(e,t){var r=t.length;if(0===r)return!0;for(var s=0;s<r;s++){var o=f.join(e,"accounts/".concat(t[s],".json"));if(!j(o))return!1}return!0},E=function(e){return(e=(e=(e=e.trim()).toLocaleLowerCase()).replace(/\s+/g,"-").trim()).replace(/\-+/g,"-").trim()},I=function(e,t){var r=[],s=f.join(e,"network.json");if(!j(s))throw new Error("network.json not found");for(var o=function(e){for(var t=[],r=0;r<e.length;r++)t.push(E(e[r]));return t}(A(s).accounts),n=0;n<t.length;n++)o.includes(t[n])&&r.push(t[n]);return r},A=function(e){var t=g.readFileSync(e).toString();return JSON.parse(t)},C=function(e,t){var r=JSON.stringify(e);g.writeFileSync(t,r)},q=function(e,t){return b.AES.encrypt(e,t).toString()},T=function(e,t){return b.AES.decrypt(e,t).toString(b.enc.Utf8)},O=["abandon","ability","able","about","above","absent","absorb","abstract","absurd","abuse","access","accident","account","accuse","achieve","acid","acoustic","acquire","across","act","action","actor","actress","actual","adapt","add","addict","address","adjust","admit","adult","advance","advice","aerobic","affair","afford","afraid","again","age","agent","agree","ahead","aim","air","airport","aisle","alarm","album","alcohol","alert","alien","all","alley","allow","almost","alone","alpha","already","also","alter","always","amateur","amazing","among","amount","amused","analyst","anchor","ancient","anger","angle","angry","animal","ankle","announce","annual","another","answer","antenna","antique","anxiety","any","apart","apology","appear","apple","approve","april","arch","arctic","area","arena","argue","arm","armed","armor","army","around","arrange","arrest","arrive","arrow","art","artefact","artist","artwork","ask","aspect","assault","asset","assist","assume","asthma","athlete","atom","attack","attend","attitude","attract","auction","audit","august","aunt","author","auto","autumn","average","avocado","avoid","awake","aware","away","awesome","awful","awkward","axis","baby","bachelor","bacon","badge","bag","balance","balcony","ball","bamboo","banana","banner","bar","barely","bargain","barrel","base","basic","basket","battle","beach","bean","beauty","because","become","beef","before","begin","behave","behind","believe","below","belt","bench","benefit","best","betray","better","between","beyond","bicycle","bid","bike","bind","biology","bird","birth","bitter","black","blade","blame","blanket","blast","bleak","bless","blind","blood","blossom","blouse","blue","blur","blush","board","boat","body","boil","bomb","bone","bonus","book","boost","border","boring","borrow","boss","bottom","bounce","box","boy","bracket","brain","brand","brass","brave","bread","breeze","brick","bridge","brief","bright","bring","brisk","broccoli","broken","bronze","broom","brother","brown","brush","bubble","buddy","budget","buffalo","build","bulb","bulk","bullet","bundle","bunker","burden","burger","burst","bus","business","busy","butter","buyer","buzz","cabbage","cabin","cable","cactus","cage","cake","call","calm","camera","camp","can","canal","cancel","candy","cannon","canoe","canvas","canyon","capable","capital","captain","car","carbon","card","cargo","carpet","carry","cart","case","cash","casino","castle","casual","cat","catalog","catch","category","cattle","caught","cause","caution","cave","ceiling","celery","cement","census","century","cereal","certain","chair","chalk","champion","change","chaos","chapter","charge","chase","chat","cheap","check","cheese","chef","cherry","chest","chicken","chief","child","chimney","choice","choose","chronic","chuckle","chunk","churn","cigar","cinnamon","circle","citizen","city","civil","claim","clap","clarify","claw","clay","clean","clerk","clever","click","client","cliff","climb","clinic","clip","clock","clog","close","cloth","cloud","clown","club","clump","cluster","clutch","coach","coast","coconut","code","coffee","coil","coin","collect","color","column","combine","come","comfort","comic","common","company","concert","conduct","confirm","congress","connect","consider","control","convince","cook","cool","copper","copy","coral","core","corn","correct","cost","cotton","couch","country","couple","course","cousin","cover","coyote","crack","cradle","craft","cram","crane","crash","crater","crawl","crazy","cream","credit","creek","crew","cricket","crime","crisp","critic","crop","cross","crouch","crowd","crucial","cruel","cruise","crumble","crunch","crush","cry","crystal","cube","culture","cup","cupboard","curious","current","curtain","curve","cushion","custom","cute","cycle","dad","damage","damp","dance","danger","daring","dash","daughter","dawn","day","deal","debate","debris","decade","december","decide","decline","decorate","decrease","deer","defense","define","defy","degree","delay","deliver","demand","demise","denial","dentist","deny","depart","depend","deposit","depth","deputy","derive","describe","desert","design","desk","despair","destroy","detail","detect","develop","device","devote","diagram","dial","diamond","diary","dice","diesel","diet","differ","digital","dignity","dilemma","dinner","dinosaur","direct","dirt","disagree","discover","disease","dish","dismiss","disorder","display","distance","divert","divide","divorce","dizzy","doctor","document","dog","doll","dolphin","domain","donate","donkey","donor","door","dose","double","dove","draft","dragon","drama","drastic","draw","dream","dress","drift","drill","drink","drip","drive","drop","drum","dry","duck","dumb","dune","during","dust","dutch","duty","dwarf","dynamic","eager","eagle","early","earn","earth","easily","east","easy","echo","ecology","economy","edge","edit","educate","effort","egg","eight","either","elbow","elder","electric","elegant","element","elephant","elevator","elite","else","embark","embody","embrace","emerge","emotion","employ","empower","empty","enable","enact","end","endless","endorse","enemy","energy","enforce","engage","engine","enhance","enjoy","enlist","enough","enrich","enroll","ensure","enter","entire","entry","envelope","episode","equal","equip","era","erase","erode","erosion","error","erupt","escape","essay","essence","estate","eternal","ethics","evidence","evil","evoke","evolve","exact","example","excess","exchange","excite","exclude","excuse","execute","exercise","exhaust","exhibit","exile","exist","exit","exotic","expand","expect","expire","explain","expose","express","extend","extra","eye","eyebrow","fabric","face","faculty","fade","faint","faith","fall","false","fame","family","famous","fan","fancy","fantasy","farm","fashion","fat","fatal","father","fatigue","fault","favorite","feature","february","federal","fee","feed","feel","female","fence","festival","fetch","fever","few","fiber","fiction","field","figure","file","film","filter","final","find","fine","finger","finish","fire","firm","first","fiscal","fish","fit","fitness","fix","flag","flame","flash","flat","flavor","flee","flight","flip","float","flock","floor","flower","fluid","flush","fly","foam","focus","fog","foil","fold","follow","food","foot","force","forest","forget","fork","fortune","forum","forward","fossil","foster","found","fox","fragile","frame","frequent","fresh","friend","fringe","frog","front","frost","frown","frozen","fruit","fuel","fun","funny","furnace","fury","future","gadget","gain","galaxy","gallery","game","gap","garage","garbage","garden","garlic","garment","gas","gasp","gate","gather","gauge","gaze","general","genius","genre","gentle","genuine","gesture","ghost","giant","gift","giggle","ginger","giraffe","girl","give","glad","glance","glare","glass","glide","glimpse","globe","gloom","glory","glove","glow","glue","goat","goddess","gold","good","goose","gorilla","gospel","gossip","govern","gown","grab","grace","grain","grant","grape","grass","gravity","great","green","grid","grief","grit","grocery","group","grow","grunt","guard","guess","guide","guilt","guitar","gun","gym","habit","hair","half","hammer","hamster","hand","happy","harbor","hard","harsh","harvest","hat","have","hawk","hazard","head","health","heart","heavy","hedgehog","height","hello","helmet","help","hen","hero","hidden","high","hill","hint","hip","hire","history","hobby","hockey","hold","hole","holiday","hollow","home","honey","hood","hope","horn","horror","horse","hospital","host","hotel","hour","hover","hub","huge","human","humble","humor","hundred","hungry","hunt","hurdle","hurry","hurt","husband","hybrid","ice","icon","idea","identify","idle","ignore","ill","illegal","illness","image","imitate","immense","immune","impact","impose","improve","impulse","inch","include","income","increase","index","indicate","indoor","industry","infant","inflict","inform","inhale","inherit","initial","inject","injury","inmate","inner","innocent","input","inquiry","insane","insect","inside","inspire","install","intact","interest","into","invest","invite","involve","iron","island","isolate","issue","item","ivory","jacket","jaguar","jar","jazz","jealous","jeans","jelly","jewel","job","join","joke","journey","joy","judge","juice","jump","jungle","junior","junk","just","kangaroo","keen","keep","ketchup","key","kick","kid","kidney","kind","kingdom","kiss","kit","kitchen","kite","kitten","kiwi","knee","knife","knock","know","lab","label","labor","ladder","lady","lake","lamp","language","laptop","large","later","latin","laugh","laundry","lava","law","lawn","lawsuit","layer","lazy","leader","leaf","learn","leave","lecture","left","leg","legal","legend","leisure","lemon","lend","length","lens","leopard","lesson","letter","level","liar","liberty","library","license","life","lift","light","like","limb","limit","link","lion","liquid","list","little","live","lizard","load","loan","lobster","local","lock","logic","lonely","long","loop","lottery","loud","lounge","love","loyal","lucky","luggage","lumber","lunar","lunch","luxury","lyrics","machine","mad","magic","magnet","maid","mail","main","major","make","mammal","man","manage","mandate","mango","mansion","manual","maple","marble","march","margin","marine","market","marriage","mask","mass","master","match","material","math","matrix","matter","maximum","maze","meadow","mean","measure","meat","mechanic","medal","media","melody","melt","member","memory","mention","menu","mercy","merge","merit","merry","mesh","message","metal","method","middle","midnight","milk","million","mimic","mind","minimum","minor","minute","miracle","mirror","misery","miss","mistake","mix","mixed","mixture","mobile","model","modify","mom","moment","monitor","monkey","monster","month","moon","moral","more","morning","mosquito","mother","motion","motor","mountain","mouse","move","movie","much","muffin","mule","multiply","muscle","museum","mushroom","music","must","mutual","myself","mystery","myth","naive","name","napkin","narrow","nasty","nation","nature","near","neck","need","negative","neglect","neither","nephew","nerve","nest","net","network","neutral","never","news","next","nice","night","noble","noise","nominee","noodle","normal","north","nose","notable","note","nothing","notice","novel","now","nuclear","number","nurse","nut","oak","obey","object","oblige","obscure","observe","obtain","obvious","occur","ocean","october","odor","off","offer","office","often","oil","okay","old","olive","olympic","omit","once","one","onion","online","only","open","opera","opinion","oppose","option","orange","orbit","orchard","order","ordinary","organ","orient","original","orphan","ostrich","other","outdoor","outer","output","outside","oval","oven","over","own","owner","oxygen","oyster","ozone","pact","paddle","page","pair","palace","palm","panda","panel","panic","panther","paper","parade","parent","park","parrot","party","pass","patch","path","patient","patrol","pattern","pause","pave","payment","peace","peanut","pear","peasant","pelican","pen","penalty","pencil","people","pepper","perfect","permit","person","pet","phone","photo","phrase","physical","piano","picnic","picture","piece","pig","pigeon","pill","pilot","pink","pioneer","pipe","pistol","pitch","pizza","place","planet","plastic","plate","play","please","pledge","pluck","plug","plunge","poem","poet","point","polar","pole","police","pond","pony","pool","popular","portion","position","possible","post","potato","pottery","poverty","powder","power","practice","praise","predict","prefer","prepare","present","pretty","prevent","price","pride","primary","print","priority","prison","private","prize","problem","process","produce","profit","program","project","promote","proof","property","prosper","protect","proud","provide","public","pudding","pull","pulp","pulse","pumpkin","punch","pupil","puppy","purchase","purity","purpose","purse","push","put","puzzle","pyramid","quality","quantum","quarter","question","quick","quit","quiz","quote","rabbit","raccoon","race","rack","radar","radio","rail","rain","raise","rally","ramp","ranch","random","range","rapid","rare","rate","rather","raven","raw","razor","ready","real","reason","rebel","rebuild","recall","receive","recipe","record","recycle","reduce","reflect","reform","refuse","region","regret","regular","reject","relax","release","relief","rely","remain","remember","remind","remove","render","renew","rent","reopen","repair","repeat","replace","report","require","rescue","resemble","resist","resource","response","result","retire","retreat","return","reunion","reveal","review","reward","rhythm","rib","ribbon","rice","rich","ride","ridge","rifle","right","rigid","ring","riot","ripple","risk","ritual","rival","river","road","roast","robot","robust","rocket","romance","roof","rookie","room","rose","rotate","rough","round","route","royal","rubber","rude","rug","rule","run","runway","rural","sad","saddle","sadness","safe","sail","salad","salmon","salon","salt","salute","same","sample","sand","satisfy","satoshi","sauce","sausage","save","say","scale","scan","scare","scatter","scene","scheme","school","science","scissors","scorpion","scout","scrap","screen","script","scrub","sea","search","season","seat","second","secret","section","security","seed","seek","segment","select","sell","seminar","senior","sense","sentence","series","service","session","settle","setup","seven","shadow","shaft","shallow","share","shed","shell","sheriff","shield","shift","shine","ship","shiver","shock","shoe","shoot","shop","short","shoulder","shove","shrimp","shrug","shuffle","shy","sibling","sick","side","siege","sight","sign","silent","silk","silly","silver","similar","simple","since","sing","siren","sister","situate","six","size","skate","sketch","ski","skill","skin","skirt","skull","slab","slam","sleep","slender","slice","slide","slight","slim","slogan","slot","slow","slush","small","smart","smile","smoke","smooth","snack","snake","snap","sniff","snow","soap","soccer","social","sock","soda","soft","solar","soldier","solid","solution","solve","someone","song","soon","sorry","sort","soul","sound","soup","source","south","space","spare","spatial","spawn","speak","special","speed","spell","spend","sphere","spice","spider","spike","spin","spirit","split","spoil","sponsor","spoon","sport","spot","spray","spread","spring","spy","square","squeeze","squirrel","stable","stadium","staff","stage","stairs","stamp","stand","start","state","stay","steak","steel","stem","step","stereo","stick","still","sting","stock","stomach","stone","stool","story","stove","strategy","street","strike","strong","struggle","student","stuff","stumble","style","subject","submit","subway","success","such","sudden","suffer","sugar","suggest","suit","summer","sun","sunny","sunset","super","supply","supreme","sure","surface","surge","surprise","surround","survey","suspect","sustain","swallow","swamp","swap","swarm","swear","sweet","swift","swim","swing","switch","sword","symbol","symptom","syrup","system","table","tackle","tag","tail","talent","talk","tank","tape","target","task","taste","tattoo","taxi","teach","team","tell","ten","tenant","tennis","tent","term","test","text","thank","that","theme","then","theory","there","they","thing","this","thought","three","thrive","throw","thumb","thunder","ticket","tide","tiger","tilt","timber","time","tiny","tip","tired","tissue","title","toast","tobacco","today","toddler","toe","together","toilet","token","tomato","tomorrow","tone","tongue","tonight","tool","tooth","top","topic","topple","torch","tornado","tortoise","toss","total","tourist","toward","tower","town","toy","track","trade","traffic","tragic","train","transfer","trap","trash","travel","tray","treat","tree","trend","trial","tribe","trick","trigger","trim","trip","trophy","trouble","truck","true","truly","trumpet","trust","truth","try","tube","tuition","tumble","tuna","tunnel","turkey","turn","turtle","twelve","twenty","twice","twin","twist","two","type","typical","ugly","umbrella","unable","unaware","uncle","uncover","under","undo","unfair","unfold","unhappy","uniform","unique","unit","universe","unknown","unlock","until","unusual","unveil","update","upgrade","uphold","upon","upper","upset","urban","urge","usage","use","used","useful","useless","usual","utility","vacant","vacuum","vague","valid","valley","valve","van","vanish","vapor","various","vast","vault","vehicle","velvet","vendor","venture","venue","verb","verify","version","very","vessel","veteran","viable","vibrant","vicious","victory","video","view","village","vintage","violin","virtual","virus","visa","visit","visual","vital","vivid","vocal","voice","void","volcano","volume","vote","voyage","wage","wagon","wait","walk","wall","walnut","want","warfare","warm","warrior","wash","wasp","waste","water","wave","way","wealth","weapon","wear","weasel","weather","web","wedding","weekend","weird","welcome","west","wet","whale","what","wheat","wheel","when","where","whip","whisper","wide","width","wife","wild","will","win","window","wine","wing","wink","winner","winter","wire","wisdom","wise","wish","witness","wolf","woman","wonder","wood","wool","word","work","world","worry","worth","wrap","wreck","wrestle","wrist","write","wrong","yard","year","yellow","you","young","youth","zebra","zero","zone","zoo"],K=new m.default(m.default.givenProvider),M=function(){function e(e,t,r,s){if(this.account_passwords={},this.account_ciphertexts={},this.disable_address=!1,this.account_signatures="",this.setting_path=e,this.account_labels=t,0!==t.length){if(r){if(t.length!==r.length)throw new Error("account_labels should have same length for account_passwords");for(var o=0;o<t.length;o++){if(!this.checkPassword(t[o],r[o].trim()))throw new Error("account_passwords is not correct");this.account_passwords[t[o]]=r[o].trim()}}s&&(this.disable_address=s),this.reload()}}return e.prototype.isLogin=function(e){return e in this.account_passwords},e.prototype.reloadAccount=function(){this.reload()},e.prototype.getAccountLabel=function(e){var t=null;for(var r in this.account_ciphertexts)r.toLocaleLowerCase().includes(e.toLocaleLowerCase())&&(t=r);return null===t?null:{account_address:t,account_label:this.account_ciphertexts[t].account_label}},e.prototype.login=function(e,t){return this.checkPassword(e,t)?(this.account_passwords[e]=t,this.account_labels.push(e),this.reload(),{status:!0,output:"Login success"}):{status:!1,output:"Password is not correct"}},e.prototype.getAccounts=function(e){var t=this.getAccountSignature();t!==this.account_signatures&&(this.account_signatures=t,this.reload());for(var r=Object.keys(this.account_ciphertexts),s=[],o=0;o<r.length;o++)this.getAccountChainType(r[o])===e&&s.push(r[o]);return s},e.prototype.checkAccountLabelIsExist=function(e){return $(this.setting_path,[e])},e.prototype.checkAccountIsExist=function(e){return(e=this.getAccountChecksumAddress(e))in this.account_ciphertexts||(this.reload(),e in this.account_ciphertexts)},e.prototype.checkPassword=function(e,t){var r=f.join(this.setting_path,"accounts/".concat(e,".json"));if(!j(r))return!1;var s,o=A(r);s="PK"===o.account_type?S({salt:t},o.data[0].ciphertexts):{slat:t,data:o.pp_ciphertexts};var n=b.SHA256(JSON.stringify(s)).toString();return o.signature===n},e.prototype.showPrivateKey=function(e){if(!this.checkAccountIsExist(e))throw new Error("Account is not exist");e=this.getAccountChecksumAddress(e);var t=this.account_ciphertexts[e],r=this.account_passwords[t.account_label];return T(t.data,r)},e.prototype.getAccountChainType=function(e){return e.startsWith("0x")&&42===e.length?"evm":/^[A-HJ-NP-Za-km-z1-9]*$/.test(e)?"solana":"unknown"},e.prototype.generatePKAccount=function(e,t,r,s,o){if(o&&this.checkAccountLabelIsExist(e))throw new Error("Account labels already exist");if(!o&&!this.account_passwords[e])throw new Error("Password is not correct");o||(r=this.account_passwords[e]);var n,i=q(t,r);try{n=this.getAccountAddressByPrivateKey(t,s)}catch(e){return{status:!1,output:e.message}}var a={address:n,data:i},c=S({salt:r},a),l={signature:b.SHA256(JSON.stringify(c)).toString(),account_type:"PK",tag:"",ciphertexts:a};return o||(this.account_passwords[e]=r,this.account_labels.push(e)),{status:!0,output:l}},e.prototype.generatePPAccount=function(e,t,r){if(this.checkAccountLabelIsExist(e))return{status:!1,output:"Account labels already exist"};var s=q(t,r),o={slat:r,data:s},n=b.SHA256(JSON.stringify(o)).toString(),i=this.getSubAccount("evm",t,0);if(!1===i.status)return{status:!1,output:i.output};var a=this.getSubAccount("solana",t,0);if(!1===a.status)return{status:!1,output:a.output};var c={signature:n,account_type:"PP",pp_ciphertexts:s,tag:"",data:[{ciphertexts:{evm:{address:i.output.address,data:q(i.output.pk,r)},solana:{address:a.output.address,data:q(a.output.pk,r)}}}]};return this.account_passwords[e]=r,this.account_labels.push(e),{status:!0,output:c}},e.prototype.generateSubAccount=function(e,t){if(!this.checkAccountLabelIsExist(e))return{status:!1,output:"Account labels not exist"};var r=f.join(this.setting_path,"accounts/".concat(e,".json")),s=A(r).pp_ciphertexts,o=T(s,this.account_passwords[e]),n=this.getSubAccount("evm",o,t);if(!1===n.status)return{status:!1,output:n.output};var i=this.getSubAccount("solana",o,t);return!1===i.status?{status:!1,output:i.output}:{status:!0,output:{evm:{address:n.output.address,data:q(n.output.pk,this.account_passwords[e])},solana:{address:i.output.address,data:q(i.output.pk,this.account_passwords[e])}}}},e.prototype.resetPassword=function(e,t){if(!this.checkAccountLabelIsExist(e))return{status:!1,output:"Account labels not exist"};if(!this.checkPassword(e,this.account_passwords[e]))return{status:!1,output:"account passwords is not correct"};var r=f.join(this.setting_path,"accounts/".concat(e,".json")),s=A(r);if("PK"===s.account_type){for(var o=s.data,n=0;n<o.length;n++){var i=o[n].ciphertexts.data,a=T(i,this.account_passwords[e]);o[n].ciphertexts.data=q(a,t)}var c=S({salt:t},s.data[0].ciphertexts);return s.signature=b.SHA256(JSON.stringify(c)).toString(),C(s,r),delete this.account_passwords[e],{status:!0,output:"Password reset successfully"}}var l=T(s.pp_ciphertexts,this.account_passwords[e]);s.pp_ciphertexts=q(l,t);var u={slat:t,data:s.pp_ciphertexts};s.signature=b.SHA256(JSON.stringify(u)).toString();var p=s.data;for(n=0;n<p.length;n++){var d=T(p[n].ciphertexts.evm.data,this.account_passwords[e]);p[n].ciphertexts.evm.data=q(d,t);var h=T(p[n].ciphertexts.solana.data,this.account_passwords[e]);p[n].ciphertexts.solana.data=q(h,t)}return C(s,r),delete this.account_passwords[e],{status:!0,output:"Password reset successfully"}},e.prototype.signTransaction=function(e,t,r){return e=this.getAccountChecksumAddress(e),this.checkAccountIsExist(e)?"unknown"===this.getAccountChainType(e)?{status:!1,output:"Chain type unknown"}:"evm"===this.getAccountChainType(e)?this.signEvmTransaction(t,r):this.signSolanaTransaction(e,r,t):{status:!1,output:"Account is not exist"}},e.prototype.sendSignedTransaction=function(e,t,r){return e=this.getAccountChecksumAddress(e),this.checkAccountIsExist(e)?"unknown"===this.getAccountChainType(e)?{status:!1,output:"Chain type unknown"}:"evm"===this.getAccountChainType(e)?this.sendEvmTransaction(t,r):this.sendSolanaTransaction(t,r):{status:!1,output:"Account is not exist"}},e.prototype.signMessage=function(e,t){return e=this.getAccountChecksumAddress(e),this.checkAccountIsExist(e)?"unknown"===this.getAccountChainType(e)?{status:!1,output:"Chain type unknown"}:"evm"===this.getAccountChainType(e)?{status:!0,output:this.signEvmMessage(t,e)}:{status:!0,output:this.signSolanaMessage(t,e)}:{status:!1,output:"Account is not exist"}},e.prototype.simulateTransaction=function(e,t,r){return k(this,void 0,void 0,function(){var s,o,n;return x(this,function(i){switch(i.label){case 0:return s=new a.Connection(t),o=this.showPrivateKey(e),n=a.Keypair.fromSecretKey(v.decode(o)),[4,_(s.simulateTransaction.bind(s),[r,[n]])];case 1:return[2,i.sent()]}})})},e.prototype.signEvmTransaction=function(e,t){return k(this,void 0,void 0,function(){var r,s,o,n;return x(this,function(i){switch(i.label){case 0:return this.account_passwords?(r=e.from,e.gas?[3,2]:[4,new P(t).getEvmGasLimit(e,t)]):[2,{status:!1,output:"Please set password first"}];case 1:if(!(s=i.sent()).status)return[2,s];e.gas=s.output,i.label=2;case 2:return e.gasPrice?[3,4]:[4,new P(t).getEvmGasPrice()];case 3:if(!(s=i.sent()).status)return[2,s];e.gasPrice=s.output,i.label=4;case 4:return o=this.showPrivateKey(r),n=new m.default(t),[4,_(n.eth.accounts.signTransaction.bind(n.eth.accounts),[e,o])];case 5:return[2,i.sent()]}})})},e.prototype.sendEvmTransaction=function(e,t){return k(this,void 0,void 0,function(){var r;return x(this,function(s){switch(s.label){case 0:return r=new m.default(t),[4,_(r.eth.sendSignedTransaction.bind(r.eth),[e])];case 1:return[2,s.sent()]}})})},e.prototype.signSolanaTransaction=function(e,t,r){return k(this,void 0,void 0,function(){var s,o,n,i,l;return x(this,function(u){switch(u.label){case 0:return s=this.showPrivateKey(e),o=a.Keypair.fromSecretKey(v.decode(s)),n=new c.Wallet(o),"recentBlockhash"in r&&r.recentBlockhash?[3,2]:(i=new a.Connection(t),[4,_(i.getLatestBlockhash.bind(i),[])]);case 1:if(!(l=u.sent()).status)return[2,{status:!1,output:"Failed to get latest blockhash"}];r.recentBlockhash=l.output.blockhash,u.label=2;case 2:return r.feePayer=n.publicKey,[4,_(n.signTransaction.bind(n),[r])];case 3:return[2,u.sent()]}})})},e.prototype.sendSolanaTransaction=function(e,t){return k(this,void 0,void 0,function(){var r;return x(this,function(s){switch(s.label){case 0:return r=new a.Connection(t),[4,_(r.sendRawTransaction.bind(r),[e.serialize()])];case 1:return[2,s.sent()]}})})},e.prototype.signEvmMessage=function(e,t){var r=this.showPrivateKey(t);return K.eth.accounts.sign(e,r).signature},e.prototype.signSolanaMessage=function(e,t){var r=this.showPrivateKey(t),s=y.sign.detached(new Uint8Array(e.match(/.{1,2}/g).map(function(e){return parseInt(e,16)})),v.decode(r));return v.encode(s)},e.prototype.checkIsDisableAddress=function(e,t){if(!e||!this.disable_address)return!1;for(var r=e.length,s=0;s<r;s++){var o=e[s].from,n=e[s].to;if(t>=o&&t<=n)return!0}return!1},e.prototype.reload=function(){if(this.account_labels=I(this.setting_path,this.account_labels),!$(this.setting_path,this.account_labels))throw new Error("Account labels not exist");for(var e={},t=this.account_labels.length,r=0;r<t;r++){var s=f.join(this.setting_path,"accounts/".concat(this.account_labels[r],".json"));if(g.existsSync(s)){var o=JSON.parse(g.readFileSync(s,"utf8"));if("PK"!==o.account_type){var n=o.data.length,i=o.disabled_slots;for(l=0;l<n;l++)this.checkIsDisableAddress(i,l)||(e[o.data[l].ciphertexts.evm.address]={account_label:this.account_labels[r],data:o.data[l].ciphertexts.evm.data},e[o.data[l].ciphertexts.solana.address]={account_label:this.account_labels[r],data:o.data[l].ciphertexts.solana.data})}else{var a=o.data;if(!a)continue;for(var c=a.length,l=0;l<c;l++)e[a[l].ciphertexts.address]={account_label:this.account_labels[r],data:a[l].ciphertexts.data}}}}this.account_ciphertexts=e},e.prototype.getAccountChecksumAddress=function(e){return"evm"===this.getAccountChainType(e)&&(e=K.utils.toChecksumAddress(e)),e},e.prototype.getAccountAddressByPrivateKey=function(e,t){return"evm"===this.getNetworkTypeByChainId(t)?K.eth.accounts.privateKeyToAccount(e).address:a.Keypair.fromSecretKey(v.decode(e)).publicKey.toBase58()},e.prototype.getNetworkTypeByChainId=function(e){return"901"===e||"902"===e||"903"===e?"solana":"evm"},e.prototype.getSubAccount=function(e,t,r){if(!function(e){var t=e.split(/\s+/g),r=t.length;if(12!==r&&24!==r)return!1;for(var s=0;s<r;s++)if(!O.includes(t[s]))return!1;return!0}(t))return{status:!1,output:"Please set correct mnemonic"};if("solana"===e){var s=w.mnemonicToSeedSync(t),o=p.HDKey.fromMasterSeed(s),n=a.Keypair.fromSeed(o.derive("m/44'/501'/".concat(r,"'/0'")).privateKey);return{status:!0,output:{address:n.publicKey.toBase58(),pk:v.encode(n.secretKey)}}}if("evm"===e){s=w.mnemonicToSeedSync(t);var i=(o=u.hdkey.fromMasterSeed(s)).derivePath("m/44'/60'/0'/0").deriveChild(r).getWallet();return{status:!0,output:{address:K.utils.toChecksumAddress(i.getAddressString()),pk:i.getPrivateKeyString()}}}return{status:!1,output:"Unknown chain type"}},e.prototype.getAccountSignature=function(){for(var e=this.account_labels.length,t=[],r=0;r<e;r++){var s=f.join(this.setting_path,"accounts/".concat(this.account_labels[r],".json")),o=g.readFileSync(s,"utf8");t.push(o)}return b.MD5(JSON.stringify(t)).toString()},e}(),D=le,L=function(){function e(e,t,r,s){this.account=new M(e,t,r,s)}return e.version=D.version,e}();e.WativeCore=L,Object.defineProperty(e,"__esModule",{value:!0})}(t,A.default,E.default,O.default,D.default,L.default,H.default,K.default,z.default,N.default,R.default,F.default)}(0,ce.exports);class ue{constructor(e,t){this.runningServices=new Map,this.configManager=new W(e,t),this.pidDir=$.join(this.configManager.getKeystorePath(),"ssh","pids"),this.ensurePidDir(),this.setupLogger()}ensurePidDir(){I.existsSync(this.pidDir)||I.mkdirSync(this.pidDir,{recursive:!0})}async isPortInUse(e,t="127.0.0.1"){return new Promise(r=>{const s=B.createServer();s.listen(e,t,()=>{s.once("close",()=>{r(!1)}),s.close()}),s.on("error",e=>{"EADDRINUSE"===e.code?r(!0):r(!1)})})}getPidFilePath(e){return $.join(this.pidDir,`${e}.pid`)}writePidFile(e,t){const r=this.getPidFilePath(e);I.writeFileSync(r,t.toString())}readPidFile(e){const t=this.getPidFilePath(e);if(!I.existsSync(t))return null;try{const e=I.readFileSync(t,"utf8").trim();return parseInt(e,10)}catch(e){return null}}removePidFile(e){const t=this.getPidFilePath(e);I.existsSync(t)&&I.unlinkSync(t)}isProcessRunning(e){try{return process.kill(e,0),!0}catch(e){return!1}}async startService(e,t){if(this.runningServices.has(e))throw new Error(`Service '${e}' is already running.`);const r=this.configManager.loadServiceConfig(e);if(await this.isPortInUse(r.ssh.port,r.ssh.listen)){const t=`Port ${r.ssh.port} on ${r.ssh.listen} is already in use. Cannot start SSH service '${e}'.`;throw this.logger.error(t),console.error(`Error: ${t}`),new Error(t)}this.logger.info(`Port ${r.ssh.port} on ${r.ssh.listen} is available for service '${e}'`);const s=t||await this.promptForPasswords(r.keystore.allowed_keystores),o=await this.configManager.validateKeystorePasswords(r.keystore.allowed_keystores,s),n=Object.entries(o).filter(([e,t])=>!t).map(([e,t])=>e);if(n.length>0)throw new Error(`Invalid passwords for keystores: ${n.join(", ")}`);const i=this.createServerInstance(r,s);i.listen(r.ssh.listen,r.ssh.port),this.writePidFile(e,process.pid),this.logger.info(`SSH service '${e}' started on ${r.ssh.listen}:${r.ssh.port}`),console.log(`SSH service '${e}' is now running in the background on ${r.ssh.listen}:${r.ssh.port}`);const a={config:r,passwords:s,server:i};this.runningServices.set(e,a),this.setupServiceLogger(e)}async stopService(e){const t=this.runningServices.get(e),r=this.readPidFile(e),s=$.join(this.pidDir,`${e}-daemon.pid`),o=$.join(this.pidDir,`${e}-watcher.pid`);let n=null,i=null;if(I.existsSync(s)){const e=I.readFileSync(s,"utf8").trim();e&&(n=parseInt(e))}if(I.existsSync(o)){const e=I.readFileSync(o,"utf8").trim();e&&(i=parseInt(e))}if(t)t.server&&t.server.close&&t.server.close(),this.runningServices.delete(e);else if(i&&this.isProcessRunning(i))try{process.kill(i,"SIGTERM"),setTimeout(()=>{this.isProcessRunning(i)&&process.kill(i,"SIGKILL");try{I.existsSync(o)&&I.unlinkSync(o),I.existsSync(s)&&I.unlinkSync(s)}catch(e){}},5e3)}catch(e){if(n&&this.isProcessRunning(n))try{process.kill(n,"SIGTERM"),setTimeout(()=>{this.isProcessRunning(n)&&process.kill(n,"SIGKILL")},5e3)}catch(e){}try{I.existsSync(o)&&I.unlinkSync(o),I.existsSync(s)&&I.unlinkSync(s)}catch(e){}}else if(n&&this.isProcessRunning(n))try{process.kill(n,"SIGTERM"),setTimeout(()=>{this.isProcessRunning(n)&&process.kill(n,"SIGKILL")},5e3),I.existsSync(s)&&I.unlinkSync(s)}catch(e){}else{if(!r||!this.isProcessRunning(r))throw new Error(`Service '${e}' is not running.`);try{process.kill(r,"SIGTERM"),setTimeout(()=>{this.isProcessRunning(r)&&process.kill(r,"SIGKILL")},5e3)}catch(e){}}this.removePidFile(e),this.logger.info(`SSH service '${e}' stopped.`)}async restartService(e,t){this.runningServices.has(e)&&await this.stopService(e),await this.startService(e,t)}getRunningServices(){return Array.from(this.runningServices.keys())}getServiceConfig(e){return this.configManager.loadServiceConfig(e)}getServiceStatus(e){if(this.runningServices.has(e))return"running";try{this.configManager.loadServiceConfig(e);const t=$.join(this.pidDir,`${e}-daemon.pid`);if(I.existsSync(t)){const e=I.readFileSync(t,"utf8").trim();if(e){const r=parseInt(e);if(this.isProcessRunning(r))return"running";I.unlinkSync(t)}}const r=this.readPidFile(e);return r&&this.isProcessRunning(r)?"running":(r&&this.removePidFile(e),"stopped")}catch(e){return"not_found"}}async stopAllServices(){const e=Array.from(this.runningServices.keys());for(const t of e)await this.stopService(t)}async createService(e,t,r,s,o){return this.configManager.createServiceConfig(e,t,r,s,o)}async removeService(e){this.runningServices.has(e)&&await this.stopService(e),this.configManager.removeServiceConfig(e),this.logger.info(`Service '${e}' removed.`)}listServices(){return this.configManager.listServiceConfigs().map(e=>{const t=this.getServiceStatus(e);let r,s;try{const t=this.configManager.loadServiceConfig(e);r=t.ssh.port,s=t.description}catch(e){}return{name:e,status:t,port:r,description:s}})}updateServiceKeystores(e,t){this.configManager.updateServiceConfig(e,{keystore:{path:this.configManager.loadServiceConfig(e).keystore.path,allowed_keystores:t}})}async promptForPasswords(e){const t={};for(const r of e){let e,s=!1,o=0;const n=3;for(;!s&&o<n;){e=await U(`Enter password for keystore [${r}]`);try{const i=this.configManager.getKeystorePath();if(s=new ce.exports.WativeCore(i,[r]).account.checkPassword(r,e),s){t[r]=e;break}if(o++,!(o<n))throw new Error(`Failed to authenticate keystore [${r}] after ${n} attempts.`);console.log(`Invalid password for ${r}`)}catch(e){if(o++,!(o<n))throw new Error(`Failed to authenticate keystore [${r}] after ${n} attempts: ${e.message}`);console.log("Error validating password for keystore")}}}return t}createServerInstance(e,t){const r=e.clients;if(0===r.length)throw new Error("No clients configured for service");if(r.length>1)throw new Error("Only one client is supported for this service");const s=JSON.parse(r[0]),o=[s.name],n=[s.public_key_path],i=[s.allowed_keystores],a=e.keystore.allowed_keystores;if(0===a.length)throw new Error("No keystores configured for service");let c=[];for(const e of a)c.push(t[e]);return new ie(e.server_keys.private_key_path,e.server_keys.passphrase,o,n,i,e.keystore.path,a,c)}async showLogs(e,t=50,r=!1){const o=process.env.HOME+"/.wative/logs";let n;if(n=e?$.join(o,`${e}.log`):$.join(o,"service_manager.log"),!I.existsSync(n))throw new Error(`Log file not found: ${n}`);const i=r?["-f",`-n${t}`,n]:[`-n${t}`,n],a=s.spawn("tail",i,{stdio:["ignore","inherit","inherit"]});return r?(process.on("SIGINT",()=>{a.kill("SIGTERM"),process.exit(0)}),new Promise((e,t)=>{a.on("close",r=>{0===r?e():t(new Error(`tail process exited with code ${r}`))})})):new Promise((e,t)=>{a.on("close",r=>{0===r?e():t(new Error(`tail process exited with code ${r}`))})})}setupLogger(){const e=process.env.HOME+"/.wative/logs";I.existsSync(e)||I.mkdirSync(e,{recursive:!0}),M.configure({appenders:{file:{type:"file",filename:$.join(e,"service_manager.log"),maxLogSize:10485760,backups:3,compress:!0,keepFileExt:!0,layout:{type:"pattern",pattern:"%d{yyyy-MM-dd hh:mm:ss.SSS} [%p] %c - %m"},encoding:"utf-8"},console:{type:"console"}},categories:{default:{appenders:["file","console"],level:"info"}}}),this.logger=M.getLogger("service_manager"),this.logger.level="info"}setupServiceLogger(e){const t=process.env.HOME+"/.wative/logs";I.existsSync(t)||I.mkdirSync(t,{recursive:!0});const r=$.join(t,`${e}.log`);this.cleanupOldLogs(t),M.configure({appenders:{file:{type:"file",filename:$.join(t,"service_manager.log"),maxLogSize:10485760,backups:3,compress:!0,keepFileExt:!0,layout:{type:"pattern",pattern:"%d{yyyy-MM-dd hh:mm:ss.SSS} [%p] %c - %m"},encoding:"utf-8"},console:{type:"console"},[`${e}_file`]:{type:"file",filename:r,maxLogSize:10485760,backups:3,compress:!0,keepFileExt:!0,layout:{type:"pattern",pattern:"%d{yyyy-MM-dd hh:mm:ss.SSS} [%p] %c - %m"},encoding:"utf-8"}},categories:{default:{appenders:["file","console"],level:"info"},[e]:{appenders:[`${e}_file`],level:"info"}}})}cleanupOldLogs(e){try{const t=I.readdirSync(e),r=new Date;r.setDate(r.getDate()-3),t.forEach(t=>{const s=$.join(e,t);I.statSync(s).mtime<r&&t.endsWith(".log")&&(I.unlinkSync(s),this.logger.info(`Deleted old log file: ${t}`))})}catch(e){this.logger.warn(`Failed to cleanup old logs: ${e}`)}}}const pe=new r.Command,de=require("../package.json");let he;pe.version(de.version).description("Wative CLI Tool"),pe.command("version").description("Show the version of wative").action(()=>{console.log(`Wative CLI Tool v${de.version}`)});const ge=()=>{if(!he){const e=$.join(process.env.HOME||"",".wative","ssh");he=new ue(e)}return he},fe=pe.command("ssh").description("Manage SSH services");fe.command("start").description("Start SSH service").option("-c, --config <name>","Specify service configuration name").option("-d, --daemon","Run service in daemon mode").action(async e=>{const t=ge();try{e.config||(console.error("Error: Configuration name is required. Use -c or --config to specify a service configuration."),process.exit(1));const r=e.config,o=t.getServiceConfig(r),n=require("net"),i=async(e,t="127.0.0.1")=>new Promise(r=>{const s=n.createServer();s.listen(e,t,()=>{s.once("close",()=>{r(!1)}),s.close()}),s.on("error",e=>{"EADDRINUSE"===e.code?r(!0):r(!1)})});if(await i(o.ssh.port,o.ssh.listen)){const e=`Port ${o.ssh.port} on ${o.ssh.listen} is already in use. Cannot start SSH service '${r}'.`;console.error(`Error: ${e}`),process.exit(1)}if(console.log(`Port ${o.ssh.port} on ${o.ssh.listen} is available for service '${r}'`),e.daemon){console.log(`Starting SSH service '${r}' in daemon mode...`);const e=await t.promptForPasswords(o.keystore.allowed_keystores),n=require("crypto"),i=n.randomBytes(32),a=n.randomBytes(16),c=n.createCipheriv("aes-256-cbc",i,a);let l=c.update(JSON.stringify(e),"utf8","hex");l+=c.final("hex");const u=a.toString("hex")+":"+i.toString("hex")+":"+l;return void((e,t)=>{const r=$.join(process.env.HOME||"",".wative","logs"),o=$.join(process.env.HOME||"",".wative","ssh","pids");I.existsSync(r)||I.mkdirSync(r,{recursive:!0}),I.existsSync(o)||I.mkdirSync(o,{recursive:!0});const n=$.join(r,`${e}-daemon.log`),i=$.join(o,`${e}-daemon.pid`),a=$.join(o,`${e}-watcher.pid`),c=s.spawn("node",[$.resolve(__dirname,"daemon-watcher.js"),e,n,i,a,$.resolve(__dirname,"..")],{detached:!0,stdio:"ignore",env:{...process.env,WATIVE_ENCRYPTED_PASSWORDS:t}});I.writeFileSync(a,c.pid.toString()),c.unref(),console.log(`SSH service '${e}' daemon watcher started with PID: ${c.pid}`),console.log(`Daemon log file: ${n}`),console.log(`Watcher PID file: ${a}`)})(r,u)}if(process.env.WATIVE_DAEMON_PASSWORDS&&process.env.WATIVE_WORKER_MODE){const e=require("crypto"),t=process.env.WATIVE_DAEMON_PASSWORDS;delete process.env.WATIVE_DAEMON_PASSWORDS,delete process.env.WATIVE_WORKER_MODE;try{const s=t.split(":"),o=Buffer.from(s[0],"hex"),n=Buffer.from(s[1],"hex"),i=s[2],a=e.createDecipheriv("aes-256-cbc",n,o);let c=a.update(i,"hex","utf8");c+=a.final("utf8");const l=JSON.parse(c);console.log(`[${(new Date).toISOString()}] Worker process starting SSH service '${r}'...`);const u=ge();await u.startService(r,l);for(const e in l)l[e]=null,delete l[e];console.log(`[${(new Date).toISOString()}] SSH service '${r}' started successfully`);const p=async e=>{console.log(`[${(new Date).toISOString()}] Worker received ${e}, stopping service...`);try{await u.stopService(r),console.log(`[${(new Date).toISOString()}] Service stopped successfully`)}catch(e){console.error(`[${(new Date).toISOString()}] Error stopping service:`,e)}process.exit(0)};process.on("SIGTERM",()=>p("SIGTERM")),process.on("SIGINT",()=>p("SIGINT"));const d=setInterval(async()=>{try{const e=await u.getServiceStatus(r);"running"!==e&&(console.log(`[${(new Date).toISOString()}] Service status changed to: ${e}`),"stopped"===e&&(console.log(`[${(new Date).toISOString()}] Service stopped unexpectedly, exiting worker...`),clearInterval(d),process.exit(1)))}catch(e){console.error(`[${(new Date).toISOString()}] Error checking service status:`,e)}},3e4),h=setInterval(()=>{},6e4),g=()=>{clearInterval(d),clearInterval(h)};process.on("exit",g)}catch(e){console.error(`[${(new Date).toISOString()}] Worker process error:`,e),process.exit(1)}return}{await t.startService(r),console.log(`SSH service '${r}' started successfully`),process.on("SIGINT",async()=>{console.log("\nReceived SIGINT, stopping services..."),await t.stopAllServices(),process.exit(0)}),process.on("SIGTERM",async()=>{console.log("\nReceived SIGTERM, stopping services..."),await t.stopAllServices(),process.exit(0)});const e=setInterval(()=>{"running"!==t.getServiceStatus(r)&&(console.log(`Service ${r} is no longer running, exiting...`),clearInterval(e),process.exit(1))},5e3);process.stdin.resume()}}catch(e){console.error(`Error: ${e instanceof Error?e.message:String(e)}`),process.exit(1)}}),fe.command("stop").description("Stop SSH service").option("-c, --config <name>","Specify service configuration name").action(async e=>{const t=ge();try{e.config||(console.error("Error: Configuration name is required. Use -c or --config to specify a service configuration."),process.exit(1)),await t.stopService(e.config),console.log(`SSH service '${e.config}' stopped successfully`)}catch(e){console.error(`Error: ${e instanceof Error?e.message:String(e)}`),process.exit(1)}}),fe.command("restart").description("Restart SSH service").option("-c, --config <name>","Specify service configuration name").action(async e=>{const t=ge();try{e.config||(console.error("Error: Configuration name is required. Use -c or --config to specify a service configuration."),process.exit(1)),await t.restartService(e.config),console.log(`SSH service '${e.config}' restarted successfully`)}catch(e){console.error(`Error: ${e instanceof Error?e.message:String(e)}`),process.exit(1)}}),fe.command("create").description("Create new SSH service configuration interactively").action(async()=>{const e=require("readline"),t=require("fs"),r=require("path"),s=e.createInterface({input:process.stdin,output:process.stdout}),o=e=>new Promise(t=>{s.question(e,t)});try{console.log("SSH create command started...");const e=r.join(process.env.HOME||"",".wative/ssh"),s=(await o(`SSH storage located in (default: ${e}): `)).trim()||e,n=r.join(process.env.HOME||"",".wative"),i=(await o(`Keystore storage located in (default: ${n}): `)).trim()||n,a=new W(s,i);let c,l,u,p;for(;;)if(c=await o("Enter service name: "),c.trim())try{a.loadServiceConfig(c),console.log("Service name already exists, please enter a different name")}catch(e){break}else console.log("Service name cannot be empty");for(;;){const e=await o("Enter port number: ");if(l=parseInt(e),isNaN(l)||l<1024||l>65535){console.log("Port number must be between 1024-65535");continue}const t=a.listServiceConfigs();let r=!1;for(const e of t)try{if(a.loadServiceConfig(e).ssh.port===l){r=!0;break}}catch(e){}if(!r)break;console.log(`Port ${l} is already in use by another service, please enter a different port`)}for(;;){const e=await o("Enter allowed keystore list (comma separated): ");if(!e.trim()){console.log("Keystore list cannot be empty");continue}if(u=e.split(",").map(e=>e.trim()).filter(e=>e),0===u.length){console.log("At least one valid keystore is required");continue}const s=r.join(i,"accounts");let n=!0;for(const e of u){const o=r.join(s,`${e}.json`);if(!t.existsSync(o)){console.log(`Keystore '${e}' does not exist`),n=!1;break}}if(n){console.log("All keystores verified to exist");break}console.log("Please re-enter valid keystore list")}for(;p=await o("Enter remote client name: "),!p.trim();)console.log("Client name cannot be empty");const d=r.join(s,"conf.d",c);t.existsSync(d)||t.mkdirSync(d,{recursive:!0});const h=r.join(d,`${p}.pub`);for(console.log("\nPlease place the remote client's public key file at the following path:"),console.log(`${h}`),console.log("\nPress Enter to continue after placing the file...");;){if(await o(""),t.existsSync(h)){console.log("Client public key file found");break}console.log("Client public key file not found, please confirm the file is correctly placed and press Enter again")}const g=await o("Enter service description (optional): ");console.log("\nCreating SSH service configuration...");const f=await a.createServiceConfig(c,l,u,p,g||void 0);console.log("\nNote: Passwords will be requested when starting the service."),console.log(`\nSSH service configuration '${c}' created successfully!`),console.log(`Port: ${l}`),console.log(`Allowed keystores: ${u.join(", ")}`),console.log(`Client name: ${p}`),console.log(`Server private key: ${f.server_keys.private_key_path}`),console.log(`Client public key: ${h}`)}catch(e){console.error(`Error: ${e instanceof Error?e.message:String(e)}`),process.exit(1)}finally{s.close()}}),fe.command("remove").description("Remove SSH service configuration").option("-c, --config <name>","Service configuration name").action(async e=>{const t=ge();try{e.config||(console.error("Error: Configuration name is required for remove command"),process.exit(1)),await t.removeService(e.config),console.log(`SSH service configuration '${e.config}' removed successfully`)}catch(e){console.error(`Error: ${e instanceof Error?e.message:String(e)}`),process.exit(1)}}),fe.command("list").description("List all SSH service configurations").action(async()=>{const e=new W,t=new ue,r=e.listServiceConfigs();if(0!==r.length){console.log("SSH Service Configurations:");for(const s of r)try{const r=e.loadServiceConfig(s),o=t.getServiceStatus(s);console.log(` - ${s}: ${r.description||"No description"} (${o})`)}catch(e){const r=t.getServiceStatus(s);console.log(` - ${s}: Configuration error (${r})`)}}else console.log("No SSH service configurations found.")}),fe.command("status").description("Show SSH service status").option("-c, --config <name>","Service configuration name").action(async e=>{const t=ge();try{if(e.config){const r=t.getServiceStatus(e.config);console.log(`SSH service '${e.config}' status: ${r}`)}else{const e=t.listServices();if(0===e.length)return void console.log("No SSH service configurations found");console.log("SSH Service Status:"),e.forEach(e=>{const r=t.getServiceStatus(e.name);console.log(` - ${e.name}: ${r}`)})}}catch(e){console.error(`Error: ${e instanceof Error?e.message:String(e)}`),process.exit(1)}}),fe.command("log").description("Show SSH service logs").option("-c, --config <name>","Service configuration name").option("-n, --lines <number>","Number of lines to show (default: 50)","50").option("-f, --follow","Follow log output").action(async e=>{const t=ge();try{const r=parseInt(e.lines)||50;await t.showLogs(e.config,r,e.follow)}catch(e){console.error(`Error: ${e instanceof Error?e.message:String(e)}`),process.exit(1)}}),pe.command("cmd").description("Start wallet-cli shell").action(async()=>{try{s.execSync("wallet-cli",{stdio:"inherit"})}catch(e){}}),(require.main===module||process.argv[1]&&(process.argv[1].includes("bin/wative.js")||process.argv[1].includes("wative")||process.argv[1].includes("ssh")))&&pe.parse(process.argv),e.program=pe,Object.defineProperty(e,"__esModule",{value:!0})});
1
+ !function(e,t){"object"==typeof exports&&"undefined"!=typeof module?t(exports,require("path"),require("commander"),require("child_process"),require("fs"),require("ini"),require("crypto"),require("ssh2"),require("figlet"),require("inquirer"),require("web3"),require("@solana/web3.js"),require("@solana/spl-token"),require("@metaplex-foundation/js"),require("bignumber.js"),require("log4js"),require("ethers"),require("tweetnacl"),require("bs58"),require("bip39"),require("@coral-xyz/anchor"),require("crypto-js"),require("ethereumjs-wallet"),require("micro-ed25519-hdkey"),require("net")):"function"==typeof define&&define.amd?define(["exports","path","commander","child_process","fs","ini","crypto","ssh2","figlet","inquirer","web3","@solana/web3.js","@solana/spl-token","@metaplex-foundation/js","bignumber.js","log4js","ethers","tweetnacl","bs58","bip39","@coral-xyz/anchor","crypto-js","ethereumjs-wallet","micro-ed25519-hdkey","net"],t):t((e="undefined"!=typeof globalThis?globalThis:e||self).demo={},e.path,e.commander,e.child_process,e.fs,e.ini,e.crypto,e.ssh2,null,e.inquirer,e.Web3,e.require$$6,null,null,null,e.log4js,e.ethers,e.require$$3,e.require$$4,e.require$$5,e.require$$7,e.require$$8,e.require$$9,e.require$$10,e.net)}(this,function(e,t,r,s,o,n,i,a,c,l,u,p,d,h,g,f,m,y,v,w,b,S,k,x,_){"use strict";function P(e){return e&&"object"==typeof e&&"default"in e?e:{default:e}}function j(e){if(e&&e.__esModule)return e;var t=Object.create(null);return e&&Object.keys(e).forEach(function(r){if("default"!==r){var s=Object.getOwnPropertyDescriptor(e,r);Object.defineProperty(t,r,s.get?s:{enumerable:!0,get:function(){return e[r]}})}}),t.default=e,Object.freeze(t)}var E=j(t),$=P(t),I=j(o),A=P(o),C=j(n),q=j(i),T=P(l),O=P(u),K=P(p),M=j(f),D=P(y),L=P(v),H=P(w),z=P(b),N=P(S),R=P(k),F=P(x),B=j(_);class W{constructor(e,t){this.configDir=e||E.join(require("os").homedir(),".wative/ssh"),this.keystorePath=t||E.join(require("os").homedir(),".wative"),I.existsSync(this.configDir)||I.mkdirSync(this.configDir,{recursive:!0});const r=E.join(this.configDir,"conf.d");I.existsSync(r)||I.mkdirSync(r,{recursive:!0})}getKeystorePath(){return this.keystorePath}getConfigDir(){return this.configDir}async createServiceConfig(e,t,r,s="default_client",o){if(!this.isValidServiceName(e))throw new Error("Invalid service name. Use only alphanumeric characters, hyphens, and underscores.");if(this.isPortInUse(t))throw new Error(`Port ${t} is already in use by another service.`);const n=await this.generateServiceKeyPair(e),i=await this.generateClientKeyPair(e,s),a={name:e,description:o||`Wative SSH Service - ${e}`,ssh:{listen:"127.0.0.1",port:t,log:{size:10485760,backups:3}},keystore:{path:this.keystorePath,allowed_keystores:r},clients:[{name:s,public_key_path:i.publicKey,allowed_keystores:r}],server_keys:{private_key_path:n.privateKey,passphrase:n.passphrase}};return this.saveServiceConfig(e,a),a}loadServiceConfig(e){const t=this.getServiceConfigPath(e);if(!I.existsSync(t))throw new Error(`Service configuration '${e}' not found.`);const r=C.parse(I.readFileSync(t,"utf-8"));return this.parseConfigData(r)}serviceIsExist(e){const t=this.getServiceConfigPath(e);return I.existsSync(E.dirname(t))}listServiceConfigs(){const e=E.join(this.configDir,"conf.d");if(!I.existsSync(e))return[];return I.readdirSync(e).filter(t=>{const r=E.join(e,t);return I.statSync(r).isDirectory()&&I.existsSync(E.join(r,"config.ini"))})}removeServiceConfig(e){const t=this.getServiceConfigPath(e),r=E.dirname(t);I.existsSync(r)&&I.rmSync(r,{recursive:!0})}updateServiceConfig(e,t){const r={...this.loadServiceConfig(e),...t};this.saveServiceConfig(e,r)}async validateKeystorePasswords(e,t){const r={},{WativeCore:s}=require("wative-core");for(const o of e)try{const e=t[o];if(!e){r[o]=!1;continue}const n=new s(this.keystorePath,[o],[e]);r[o]=n.account.isLogin(o)}catch(e){r[o]=!1}return r}isValidServiceName(e){return/^[a-zA-Z0-9_-]+$/.test(e)&&e.length>0&&e.length<=50}isPortInUse(e){const t=this.listServiceConfigs();for(const r of t)try{if(this.loadServiceConfig(r).ssh.port===e)return!0}catch(e){}return!1}async generateServiceKeyPair(e){const t=this.generateSecurePassphrase(),r=E.join(this.configDir,"conf.d",e);I.existsSync(r)||I.mkdirSync(r,{recursive:!0});const o=E.join(r,"server_private_key"),n=E.join(r,"server_public_key.pub");return I.existsSync(o)||(console.log(`Generating SSH server key pair for service '${e}'...`),s.execSync(`ssh-keygen -t rsa -b 4096 -f ${o} -N '${t}' -C 'wative_${e}_server'`,{stdio:"inherit"})),{privateKey:o,publicKey:n,passphrase:t}}async generateClientKeyPair(e,t){const r=E.join(this.configDir,"conf.d",e);I.existsSync(r)||I.mkdirSync(r,{recursive:!0});return{privateKey:"",publicKey:E.join(r,`${t}.pub`),passphrase:""}}generateSecurePassphrase(){return q.randomBytes(32).toString("hex")}getServiceConfigPath(e){return E.join(this.configDir,"conf.d",e,"config.ini")}saveServiceConfig(e,t){const r=this.getServiceConfigPath(e),s=E.dirname(r);I.existsSync(s)||I.mkdirSync(s,{recursive:!0});const o=C.stringify(t);I.writeFileSync(r,o)}parseConfigData(e){return{name:e.name,description:e.description,ssh:{listen:e.ssh.listen,port:parseInt(e.ssh.port),log:{size:parseInt(e.ssh.log.size),backups:parseInt(e.ssh.log.backups)}},keystore:{path:e.keystore.path,allowed_keystores:Array.isArray(e.keystore.allowed_keystores)?e.keystore.allowed_keystores:e.keystore.allowed_keystores.split(",")},clients:Array.isArray(e.clients)?e.clients:[e.clients],server_keys:{private_key_path:e.server_keys.private_key_path,passphrase:e.server_keys.passphrase}}}}require("chalk"),require("chalk"),require("chalk"),process.env.HOME||process.env.USERPROFILE;const U=e=>e=(e=(e=(e=e.trim()).toLocaleLowerCase()).replace(/\s+/g,"-").trim()).replace(/\-+/g,"-").trim(),G=async e=>{const t=[{name:"password",type:"password",mask:"#",message:`${e}:`}];let{password:r}=await T.default.prompt(t);return r};require("bn.js"),require("ethereumjs-util"),require("bignumber.js"),require("chalk"),require("wative-core"),require("chalk"),require("dotenv").config(),require("cli-progress"),require("wative-core");const{WativeCore:J}=require("wative-core"),{Connection:V,PublicKey:Z,VersionedTransaction:Q,VersionedMessage:Y}=require("@solana/web3.js"),X=require("bs58"),{Keypair:ee,TransactionMessage:te,ComputeBudgetInstruction:re,TransactionInstruction:se,ComputeBudgetProgram:oe}=require("@solana/web3.js"),{Wallet:ne}=require("@coral-xyz/anchor");M.configure({appenders:{file:{type:"file",filename:process.env.HOME+"/.wative/logs/wative.log",maxLogSize:10485760,backups:3,compress:!0,keepFileExt:!0,layout:{type:"pattern",pattern:"%d{yyyy-MM-dd hh:mm:ss.SSS} [%p] %c - %m"},encoding:"utf-8"},console:{type:"console"}},categories:{default:{appenders:["file","console"],level:"info"}}});const ie=M.getLogger("file");ie.level="info";class ae{constructor(e,t,r,s,n,i,c,l){if(this._allowedAppIds=[],this._allowedPubKeys=[],this._allowedKeystoreIds=[],this._sessionIdAppIdMap={},(e=>{if(e=e.trim(),!I.existsSync(e))throw new Error("File not exists")})(e),0===r.length||0===s.length||0===n.length||r.length!==s.length||r.length!==n.length)throw new Error("WativeWielderServer:: constructor: Invaild AllowedApp");for(let e=0;e<n.length;e++)for(let t=0;t<n[e].length;t++){const r=n[e][t];if(!c.includes(r))throw new Error("WativeWielderServer:: constructor: Invaild AllowedKeystoreIds")}for(let e of r)this._allowedAppIds.push(Buffer.from(e));for(let e of s){let t=a.utils.parseKey(o.readFileSync(e));this._allowedPubKeys.push(t)}this.wativeCore=new J(i,c,l),this._idRsaPrivatePath=e,this._idRsaPassphrase=t,this._allowedKeystoreIds=n,this._keystoreDirectoryPath=i}listen(e,t){new a.Server({hostKeys:[{key:o.readFileSync(this._idRsaPrivatePath),passphrase:this._idRsaPassphrase}]},e=>{e.on("authentication",t=>{let r=!0;if(this&&(this.checkValue(Buffer.from(t.username),"appId")||(r=!1)),"publickey"!==t.method||!r)return t.reject();{let e=this.getBytesIndex(Buffer.from(t.username),this._allowedAppIds),r=this._allowedPubKeys[e];if(t.key.algo!==r.type||!this.checkValue(t.key.data,"publicKey")||t.signature&&!0!==r.verify(t.blob,t.signature,t.hashAlgo))return t.reject()}if(r){const r=e._protocol._kex.sessionID.toString("hex");this._sessionIdAppIdMap[r]=Buffer.from(t.username),t.accept()}else t.reject()}).on("ready",()=>{e.on("session",(t,r)=>{t().once("exec",async(t,r,s)=>{const o=e._protocol._kex.sessionID.toString("hex"),n=await this.web3Request(o,s.command),i=t();i&&(JSON.stringify(n)?(i.write(JSON.stringify(n)),i.exit(0),i.end()):(i.write("ssh2 connect error"),i.exit(0),i.end()))})})}).on("close",()=>{ie.info("Client disconnected")}).on("error",e=>{ie.error("err: ",e.message)})}).listen(t,e,function(){ie.info("Listening on port "+t)})}async web3Request(e,t){try{const r=this._sessionIdAppIdMap[e],s=this.getBytesIndex(r,this._allowedAppIds);if(s<0)return{status:!1,msg:"app not found"};let o=JSON.parse(t);ie.info("sign message: ",t);let n=o.method,i=o.keystoreId||o.params.keystoreId,a=o.chainId||o.params.chainId;if(!this._allowedKeystoreIds[s].includes(i))return{status:!1,msg:"keystore not allowed"};let c;if("get_root_account"===n)c=this.getRootAccount(i,a);else if("get_sub_account"===n){let e=o.params;c=this.getSubAccount(i,e.chainId,null==e?void 0:e.startIndex,null==e?void 0:e.endIndex)}else if("sign"===n){let e=o.params;try{c=await this.wativeCore.account.signTransaction(e.txParams.from,e.txParams,e.rpcUrl)}catch(e){return ie.error("sign error: ",e.message),{status:!1,msg:e.msg}}}else if("sign_and_send"===n){let e=o.params;try{c={transactionHash:await this.wativeCore.account.signAndSendTx(e.txParams,e.rpcUrl)}}catch(e){return{status:!1,msg:e.msg}}}else if("solana_sign"===n)try{let e=o.params;c=await this.signSolanaTransaction(e.txParams.from,e.txParams.data,e.txParams.lookup_tables,e.rpcUrl,e.priority_fee)}catch(e){return ie.error("sign error: ",e.message),{status:!1,msg:e.msg}}else if("solana_send"===n)try{let e=o.params;c=await this.sendSignedSolanaTransaction(e.txParams.from,e.txParams.signature,e.txParams.data,e.rpcUrl)}catch(e){return ie.error("sign error: ",e.message),{status:!1,msg:e.msg}}else if("sign_message"===n)try{let e=o.params;ie.debug("sign message: ",e),c=await this.signMessage(e.account,e.message)}catch(e){return ie.error("sign error: ",e.message),{status:!1,msg:e.msg}}else{if("sign_typed_data"!==n)return{status:!1,msg:"message method not find"};try{let e=o.params;ie.debug("sign message: ",e),c=await this.signTypedData(e.account,e.domain,e.types_name,e.types,e.message)}catch(e){return ie.error("sign error: ",e.message),{status:!1,msg:e.msg}}}return{status:!0,data:c}}catch(e){return ie.error("sign error: ",e.message),{status:!1,msg:e.msg}}}checkValue(e,t){if("appId"!==t&&"publicKey"!==t)return!1;let r=this._allowedAppIds.length;for(let s=0;s<r;s++){let r;r="appId"===t?this._allowedAppIds[s]:this._allowedPubKeys[s].getPublicSSH();const o=e.length!==r.length;o&&(r=e);const n=i.timingSafeEqual(e,r);if(!o&&n)return!0}}getBytesIndex(e,t){let r=t.length;for(let s=0;s<r;s++)if(e.length===t[s].length&&i.timingSafeEqual(e,t[s]))return s;return-1}getRootAccount(e,t){const r=E.resolve(this._keystoreDirectoryPath,`accounts/${e}.json`);let s,n=o.readFileSync(r);return n=JSON.parse(n.toString()),s="SOLANA"===this.getChainType(t)?n.data[0].ciphertexts.solana.address:n.data[0].ciphertexts.evm.address,[{id:0,address:s,children:n.data.length,type:"M"}]}getChainType(e){return"901"===e||"902"===e||"903"===e?"SOLANA":"EVM"}getSubAccount(e,t,r,s){const n=E.resolve(this._keystoreDirectoryPath,`accounts/${e}.json`);let i=o.readFileSync(n);i=JSON.parse(i.toString());let a=i.data.length-1;s&&s<a&&(a=s);let c=0;if(r&&r>0&&(c=r),c>a)return[];let l=this.getChainType(t),u=[];for(let e=c;e<=a;e++)u.push(i.data[e].ciphertexts[l.toLocaleLowerCase()].address);return u}async signMessage(e,t){let r=await this.wativeCore.account.signMessage(e,t);return console.log(r),r}async signTypedData(e,t,r,s,o){let n=JSON.parse(t),i=JSON.parse(s),a=JSON.parse(o);console.log(n),console.log(i),console.log(a);let c=this.wativeCore.account.showPrivateKey(e),l=new m.ethers.Wallet(c),u=await l.signTypedData(n,{[r]:i},a);return console.log(u),{status:!0,output:u}}async signSolanaTransaction(e,t,r,s,o){let n=new V(s),i=[];if(r)for(let e of r){let t=(await n.getAddressLookupTable(new Z(e))).value;i.push(t),await ce(1e3)}let a=Y.deserialize(Uint8Array.from(Buffer.from(t,"hex"))),c=te.decompile(a);c.instructions.push(oe.setComputeUnitLimit({units:2e6})),c.instructions.push(oe.setComputeUnitPrice({microLamports:1e3})),a=c.compileToV0Message(i),a.recentBlockhash=(await n.getLatestBlockhash()).blockhash,await ce(3e3);let l=new Q(a),u=this.wativeCore.account.showPrivateKey(e);const p=ee.fromSecretKey(new Uint8Array(X.decode(u))),d=new ne(p);let h=await n.simulateTransaction(l);if(!h||!h.value||0===h.value.unitsConsumed||h.value.err)return{status:!1,output:h.value.err};let g=c.instructions.length,f=Math.trunc(1.2*h.value.unitsConsumed);if(c.instructions[g-2]=oe.setComputeUnitLimit({units:f}),!o||"null"==o)try{o=await this.getPrioritizationFee(s)}catch(e){o=2e5}o<1e4&&(o=1e4),o>5e5&&(o=5e5),c.instructions[g-1]=oe.setComputeUnitPrice({microLamports:o}),a=c.compileToV0Message(i),await ce(1e3),a.recentBlockhash=(await n.getLatestBlockhash()).blockhash,l=new Q(a),l.feePayer=d.publicKey,await ce(3e3);let m=await this.wativeCore.account.signTransaction(e,l,s),y=new Q(m.output.message,m.output.signatures).message.serialize();return y=Buffer.from(y).toString("hex"),{status:!0,output:{transactionHash:X.encode(m.output.signatures[0]),message:y,compute_units:h.value.unitsConsumed.toString()}}}async sendSignedSolanaTransaction(e,t,r,s){let o=[X.decode(t)],n=Y.deserialize(Uint8Array.from(Buffer.from(r,"hex"))),i=new Q(n,o);return await this.wativeCore.account.sendSignedTransaction(e,i,s)}async getPrioritizationFee(e){let t=new Z("JUP6LkbZbjS1jKKwapdHNy74zcZ3tLUZoi5QNyVTaV4");const r=new V(e,"confirmed");let s=await r.getSignaturesForAddress(t,{limit:5});await ce(2e3);let o=[];for(let e=0;e<s.length;e++)o.push(s[e].signature);let n=await r.getParsedTransactions(o,{maxSupportedTransactionVersion:0}),i=0;for(let e=0;e<n.length;e++){let t=n[e].transaction.message.instructions;for(let e=0;e<t.length;e++)if("ComputeBudget111111111111111111111111111111"===t[e].programId.toBase58()){let r=t[e].data;try{let e=new se({keys:[],programId:new Z("ComputeBudget111111111111111111111111111111"),data:Buffer.from(X.decode(r))}),{microLamports:t}=re.decodeSetComputeUnitPrice(e);i+=Number(t);continue}catch(e){}}}return Math.ceil(i/5)}}const ce=e=>new Promise(t=>setTimeout(t,e));"undefined"!=typeof globalThis?globalThis:"undefined"!=typeof window?window:"undefined"!=typeof global?global:"undefined"!=typeof self&&self;var le={exports:{}},ue={name:"wative-core",version:"1.0.21",description:"An agile keystore management toolkit",main:"lib/index.umd.js",module:"lib/index.esm.js",types:"lib/index.d.ts",scripts:{test:"jest",compile:"tsc",build:"rollup --config"},repository:{type:"git",url:""},bugs:{url:"https://github.com"},homepage:"https://github.com",keywords:["keystore","wallet"],author:"",license:"ISC",files:["src/","lib/"],dependencies:{"@babel/plugin-transform-modules-commonjs":"7.24.1","@rollup/plugin-commonjs":"21.0.1","@solana/web3.js":"1.91.8","@types/bs58":"4.0.4","crypto-js":"4.2.0","ethereumjs-wallet":"1.0.2",jest:"27.5.1","micro-ed25519-hdkey":"0.1.2",rollup:"2.79.1","rollup-plugin-terser":"7.0.2","rollup-plugin-typescript2":"0.31.2",tslib:"2.6.2",typescript:"4.9.5",web3:"1.7.3","web3-core":"4.3.2","@coral-xyz/anchor":"0.30.1","@types/crypto-js":"4.2.2","nodejs-threadpool":"1.0.1",tweetnacl:"1.0.3","rpc-websockets":"7.10.0"}};!function(e,t){!function(e,t,r,s,o,n,i,a,c,l,u,p){function d(e){return e&&"object"==typeof e&&"default"in e?e:{default:e}}function h(e){if(e&&e.__esModule)return e;var t=Object.create(null);return e&&Object.keys(e).forEach(function(r){if("default"!==r){var s=Object.getOwnPropertyDescriptor(e,r);Object.defineProperty(t,r,s.get?s:{enumerable:!0,get:function(){return e[r]}})}}),t.default=e,Object.freeze(t)}var g=h(t),f=h(r),m=d(s),y=h(o),v=h(n),w=h(i),b=h(l),S=function(){return S=Object.assign||function(e){for(var t,r=1,s=arguments.length;r<s;r++)for(var o in t=arguments[r])Object.prototype.hasOwnProperty.call(t,o)&&(e[o]=t[o]);return e},S.apply(this,arguments)};function k(e,t,r,s){return new(r||(r=Promise))(function(o,n){function i(e){try{c(s.next(e))}catch(e){n(e)}}function a(e){try{c(s.throw(e))}catch(e){n(e)}}function c(e){var t;e.done?o(e.value):(t=e.value,t instanceof r?t:new r(function(e){e(t)})).then(i,a)}c((s=s.apply(e,t||[])).next())})}function x(e,t){var r,s,o,n={label:0,sent:function(){if(1&o[0])throw o[1];return o[1]},trys:[],ops:[]},i=Object.create(("function"==typeof Iterator?Iterator:Object).prototype);return i.next=a(0),i.throw=a(1),i.return=a(2),"function"==typeof Symbol&&(i[Symbol.iterator]=function(){return this}),i;function a(a){return function(c){return function(a){if(r)throw new TypeError("Generator is already executing.");for(;i&&(i=0,a[0]&&(n=0)),n;)try{if(r=1,s&&(o=2&a[0]?s.return:a[0]?s.throw||((o=s.return)&&o.call(s),0):s.next)&&!(o=o.call(s,a[1])).done)return o;switch(s=0,o&&(a=[2&a[0],o.value]),a[0]){case 0:case 1:o=a;break;case 4:return n.label++,{value:a[1],done:!1};case 5:n.label++,s=a[1],a=[0];continue;case 7:a=n.ops.pop(),n.trys.pop();continue;default:if(!((o=(o=n.trys).length>0&&o[o.length-1])||6!==a[0]&&2!==a[0])){n=0;continue}if(3===a[0]&&(!o||a[1]>o[0]&&a[1]<o[3])){n.label=a[1];break}if(6===a[0]&&n.label<o[1]){n.label=o[1],o=a;break}if(o&&n.label<o[2]){n.label=o[2],n.ops.push(a);break}o[2]&&n.ops.pop(),n.trys.pop();continue}a=t.call(e,n)}catch(e){a=[6,e],s=0}finally{r=o=0}if(5&a[0])throw a[1];return{value:a[0]?a[1]:void 0,done:!0}}([a,c])}}}"function"==typeof SuppressedError&&SuppressedError;var _=function(e,t){return k(void 0,void 0,void 0,function(){var r,s,o;return x(this,function(n){switch(n.label){case 0:return n.trys.push([0,2,,3]),[4,e.apply(void 0,t)];case 1:return s=n.sent(),r={status:!0,output:s},[3,3];case 2:return o=n.sent(),r={status:!1,output:o.toString()},[3,3];case 3:return[2,r]}})})},P=function(){function e(e){this.web3=new m.default(e)}return e.prototype.getEvmGasPrice=function(){return k(this,void 0,void 0,function(){return x(this,function(e){switch(e.label){case 0:return[4,_(this.web3.eth.getGasPrice,[])];case 1:return[2,e.sent()]}})})},e.prototype.getEvmGasLimit=function(e,t){return k(this,void 0,void 0,function(){return x(this,function(r){switch(r.label){case 0:return[4,_(this.web3.eth.estimateGas,[e,t])];case 1:return[2,r.sent()]}})})},e}(),j=function(e){return e=e.trim(),g.existsSync(e)},E=function(e,t){var r=t.length;if(0===r)return!0;for(var s=0;s<r;s++){var o=f.join(e,"accounts/".concat(t[s],".json"));if(!j(o))return!1}return!0},$=function(e){return(e=(e=(e=e.trim()).toLocaleLowerCase()).replace(/\s+/g,"-").trim()).replace(/\-+/g,"-").trim()},I=function(e,t){var r=[],s=f.join(e,"network.json");if(!j(s))throw new Error("network.json not found");for(var o=function(e){for(var t=[],r=0;r<e.length;r++)t.push($(e[r]));return t}(A(s).accounts),n=0;n<t.length;n++)o.includes(t[n])&&r.push(t[n]);return r},A=function(e){var t=g.readFileSync(e).toString();return JSON.parse(t)},C=function(e,t){var r=JSON.stringify(e);g.writeFileSync(t,r)},q=function(e,t){return b.AES.encrypt(e,t).toString()},T=function(e,t){return b.AES.decrypt(e,t).toString(b.enc.Utf8)},O=["abandon","ability","able","about","above","absent","absorb","abstract","absurd","abuse","access","accident","account","accuse","achieve","acid","acoustic","acquire","across","act","action","actor","actress","actual","adapt","add","addict","address","adjust","admit","adult","advance","advice","aerobic","affair","afford","afraid","again","age","agent","agree","ahead","aim","air","airport","aisle","alarm","album","alcohol","alert","alien","all","alley","allow","almost","alone","alpha","already","also","alter","always","amateur","amazing","among","amount","amused","analyst","anchor","ancient","anger","angle","angry","animal","ankle","announce","annual","another","answer","antenna","antique","anxiety","any","apart","apology","appear","apple","approve","april","arch","arctic","area","arena","argue","arm","armed","armor","army","around","arrange","arrest","arrive","arrow","art","artefact","artist","artwork","ask","aspect","assault","asset","assist","assume","asthma","athlete","atom","attack","attend","attitude","attract","auction","audit","august","aunt","author","auto","autumn","average","avocado","avoid","awake","aware","away","awesome","awful","awkward","axis","baby","bachelor","bacon","badge","bag","balance","balcony","ball","bamboo","banana","banner","bar","barely","bargain","barrel","base","basic","basket","battle","beach","bean","beauty","because","become","beef","before","begin","behave","behind","believe","below","belt","bench","benefit","best","betray","better","between","beyond","bicycle","bid","bike","bind","biology","bird","birth","bitter","black","blade","blame","blanket","blast","bleak","bless","blind","blood","blossom","blouse","blue","blur","blush","board","boat","body","boil","bomb","bone","bonus","book","boost","border","boring","borrow","boss","bottom","bounce","box","boy","bracket","brain","brand","brass","brave","bread","breeze","brick","bridge","brief","bright","bring","brisk","broccoli","broken","bronze","broom","brother","brown","brush","bubble","buddy","budget","buffalo","build","bulb","bulk","bullet","bundle","bunker","burden","burger","burst","bus","business","busy","butter","buyer","buzz","cabbage","cabin","cable","cactus","cage","cake","call","calm","camera","camp","can","canal","cancel","candy","cannon","canoe","canvas","canyon","capable","capital","captain","car","carbon","card","cargo","carpet","carry","cart","case","cash","casino","castle","casual","cat","catalog","catch","category","cattle","caught","cause","caution","cave","ceiling","celery","cement","census","century","cereal","certain","chair","chalk","champion","change","chaos","chapter","charge","chase","chat","cheap","check","cheese","chef","cherry","chest","chicken","chief","child","chimney","choice","choose","chronic","chuckle","chunk","churn","cigar","cinnamon","circle","citizen","city","civil","claim","clap","clarify","claw","clay","clean","clerk","clever","click","client","cliff","climb","clinic","clip","clock","clog","close","cloth","cloud","clown","club","clump","cluster","clutch","coach","coast","coconut","code","coffee","coil","coin","collect","color","column","combine","come","comfort","comic","common","company","concert","conduct","confirm","congress","connect","consider","control","convince","cook","cool","copper","copy","coral","core","corn","correct","cost","cotton","couch","country","couple","course","cousin","cover","coyote","crack","cradle","craft","cram","crane","crash","crater","crawl","crazy","cream","credit","creek","crew","cricket","crime","crisp","critic","crop","cross","crouch","crowd","crucial","cruel","cruise","crumble","crunch","crush","cry","crystal","cube","culture","cup","cupboard","curious","current","curtain","curve","cushion","custom","cute","cycle","dad","damage","damp","dance","danger","daring","dash","daughter","dawn","day","deal","debate","debris","decade","december","decide","decline","decorate","decrease","deer","defense","define","defy","degree","delay","deliver","demand","demise","denial","dentist","deny","depart","depend","deposit","depth","deputy","derive","describe","desert","design","desk","despair","destroy","detail","detect","develop","device","devote","diagram","dial","diamond","diary","dice","diesel","diet","differ","digital","dignity","dilemma","dinner","dinosaur","direct","dirt","disagree","discover","disease","dish","dismiss","disorder","display","distance","divert","divide","divorce","dizzy","doctor","document","dog","doll","dolphin","domain","donate","donkey","donor","door","dose","double","dove","draft","dragon","drama","drastic","draw","dream","dress","drift","drill","drink","drip","drive","drop","drum","dry","duck","dumb","dune","during","dust","dutch","duty","dwarf","dynamic","eager","eagle","early","earn","earth","easily","east","easy","echo","ecology","economy","edge","edit","educate","effort","egg","eight","either","elbow","elder","electric","elegant","element","elephant","elevator","elite","else","embark","embody","embrace","emerge","emotion","employ","empower","empty","enable","enact","end","endless","endorse","enemy","energy","enforce","engage","engine","enhance","enjoy","enlist","enough","enrich","enroll","ensure","enter","entire","entry","envelope","episode","equal","equip","era","erase","erode","erosion","error","erupt","escape","essay","essence","estate","eternal","ethics","evidence","evil","evoke","evolve","exact","example","excess","exchange","excite","exclude","excuse","execute","exercise","exhaust","exhibit","exile","exist","exit","exotic","expand","expect","expire","explain","expose","express","extend","extra","eye","eyebrow","fabric","face","faculty","fade","faint","faith","fall","false","fame","family","famous","fan","fancy","fantasy","farm","fashion","fat","fatal","father","fatigue","fault","favorite","feature","february","federal","fee","feed","feel","female","fence","festival","fetch","fever","few","fiber","fiction","field","figure","file","film","filter","final","find","fine","finger","finish","fire","firm","first","fiscal","fish","fit","fitness","fix","flag","flame","flash","flat","flavor","flee","flight","flip","float","flock","floor","flower","fluid","flush","fly","foam","focus","fog","foil","fold","follow","food","foot","force","forest","forget","fork","fortune","forum","forward","fossil","foster","found","fox","fragile","frame","frequent","fresh","friend","fringe","frog","front","frost","frown","frozen","fruit","fuel","fun","funny","furnace","fury","future","gadget","gain","galaxy","gallery","game","gap","garage","garbage","garden","garlic","garment","gas","gasp","gate","gather","gauge","gaze","general","genius","genre","gentle","genuine","gesture","ghost","giant","gift","giggle","ginger","giraffe","girl","give","glad","glance","glare","glass","glide","glimpse","globe","gloom","glory","glove","glow","glue","goat","goddess","gold","good","goose","gorilla","gospel","gossip","govern","gown","grab","grace","grain","grant","grape","grass","gravity","great","green","grid","grief","grit","grocery","group","grow","grunt","guard","guess","guide","guilt","guitar","gun","gym","habit","hair","half","hammer","hamster","hand","happy","harbor","hard","harsh","harvest","hat","have","hawk","hazard","head","health","heart","heavy","hedgehog","height","hello","helmet","help","hen","hero","hidden","high","hill","hint","hip","hire","history","hobby","hockey","hold","hole","holiday","hollow","home","honey","hood","hope","horn","horror","horse","hospital","host","hotel","hour","hover","hub","huge","human","humble","humor","hundred","hungry","hunt","hurdle","hurry","hurt","husband","hybrid","ice","icon","idea","identify","idle","ignore","ill","illegal","illness","image","imitate","immense","immune","impact","impose","improve","impulse","inch","include","income","increase","index","indicate","indoor","industry","infant","inflict","inform","inhale","inherit","initial","inject","injury","inmate","inner","innocent","input","inquiry","insane","insect","inside","inspire","install","intact","interest","into","invest","invite","involve","iron","island","isolate","issue","item","ivory","jacket","jaguar","jar","jazz","jealous","jeans","jelly","jewel","job","join","joke","journey","joy","judge","juice","jump","jungle","junior","junk","just","kangaroo","keen","keep","ketchup","key","kick","kid","kidney","kind","kingdom","kiss","kit","kitchen","kite","kitten","kiwi","knee","knife","knock","know","lab","label","labor","ladder","lady","lake","lamp","language","laptop","large","later","latin","laugh","laundry","lava","law","lawn","lawsuit","layer","lazy","leader","leaf","learn","leave","lecture","left","leg","legal","legend","leisure","lemon","lend","length","lens","leopard","lesson","letter","level","liar","liberty","library","license","life","lift","light","like","limb","limit","link","lion","liquid","list","little","live","lizard","load","loan","lobster","local","lock","logic","lonely","long","loop","lottery","loud","lounge","love","loyal","lucky","luggage","lumber","lunar","lunch","luxury","lyrics","machine","mad","magic","magnet","maid","mail","main","major","make","mammal","man","manage","mandate","mango","mansion","manual","maple","marble","march","margin","marine","market","marriage","mask","mass","master","match","material","math","matrix","matter","maximum","maze","meadow","mean","measure","meat","mechanic","medal","media","melody","melt","member","memory","mention","menu","mercy","merge","merit","merry","mesh","message","metal","method","middle","midnight","milk","million","mimic","mind","minimum","minor","minute","miracle","mirror","misery","miss","mistake","mix","mixed","mixture","mobile","model","modify","mom","moment","monitor","monkey","monster","month","moon","moral","more","morning","mosquito","mother","motion","motor","mountain","mouse","move","movie","much","muffin","mule","multiply","muscle","museum","mushroom","music","must","mutual","myself","mystery","myth","naive","name","napkin","narrow","nasty","nation","nature","near","neck","need","negative","neglect","neither","nephew","nerve","nest","net","network","neutral","never","news","next","nice","night","noble","noise","nominee","noodle","normal","north","nose","notable","note","nothing","notice","novel","now","nuclear","number","nurse","nut","oak","obey","object","oblige","obscure","observe","obtain","obvious","occur","ocean","october","odor","off","offer","office","often","oil","okay","old","olive","olympic","omit","once","one","onion","online","only","open","opera","opinion","oppose","option","orange","orbit","orchard","order","ordinary","organ","orient","original","orphan","ostrich","other","outdoor","outer","output","outside","oval","oven","over","own","owner","oxygen","oyster","ozone","pact","paddle","page","pair","palace","palm","panda","panel","panic","panther","paper","parade","parent","park","parrot","party","pass","patch","path","patient","patrol","pattern","pause","pave","payment","peace","peanut","pear","peasant","pelican","pen","penalty","pencil","people","pepper","perfect","permit","person","pet","phone","photo","phrase","physical","piano","picnic","picture","piece","pig","pigeon","pill","pilot","pink","pioneer","pipe","pistol","pitch","pizza","place","planet","plastic","plate","play","please","pledge","pluck","plug","plunge","poem","poet","point","polar","pole","police","pond","pony","pool","popular","portion","position","possible","post","potato","pottery","poverty","powder","power","practice","praise","predict","prefer","prepare","present","pretty","prevent","price","pride","primary","print","priority","prison","private","prize","problem","process","produce","profit","program","project","promote","proof","property","prosper","protect","proud","provide","public","pudding","pull","pulp","pulse","pumpkin","punch","pupil","puppy","purchase","purity","purpose","purse","push","put","puzzle","pyramid","quality","quantum","quarter","question","quick","quit","quiz","quote","rabbit","raccoon","race","rack","radar","radio","rail","rain","raise","rally","ramp","ranch","random","range","rapid","rare","rate","rather","raven","raw","razor","ready","real","reason","rebel","rebuild","recall","receive","recipe","record","recycle","reduce","reflect","reform","refuse","region","regret","regular","reject","relax","release","relief","rely","remain","remember","remind","remove","render","renew","rent","reopen","repair","repeat","replace","report","require","rescue","resemble","resist","resource","response","result","retire","retreat","return","reunion","reveal","review","reward","rhythm","rib","ribbon","rice","rich","ride","ridge","rifle","right","rigid","ring","riot","ripple","risk","ritual","rival","river","road","roast","robot","robust","rocket","romance","roof","rookie","room","rose","rotate","rough","round","route","royal","rubber","rude","rug","rule","run","runway","rural","sad","saddle","sadness","safe","sail","salad","salmon","salon","salt","salute","same","sample","sand","satisfy","satoshi","sauce","sausage","save","say","scale","scan","scare","scatter","scene","scheme","school","science","scissors","scorpion","scout","scrap","screen","script","scrub","sea","search","season","seat","second","secret","section","security","seed","seek","segment","select","sell","seminar","senior","sense","sentence","series","service","session","settle","setup","seven","shadow","shaft","shallow","share","shed","shell","sheriff","shield","shift","shine","ship","shiver","shock","shoe","shoot","shop","short","shoulder","shove","shrimp","shrug","shuffle","shy","sibling","sick","side","siege","sight","sign","silent","silk","silly","silver","similar","simple","since","sing","siren","sister","situate","six","size","skate","sketch","ski","skill","skin","skirt","skull","slab","slam","sleep","slender","slice","slide","slight","slim","slogan","slot","slow","slush","small","smart","smile","smoke","smooth","snack","snake","snap","sniff","snow","soap","soccer","social","sock","soda","soft","solar","soldier","solid","solution","solve","someone","song","soon","sorry","sort","soul","sound","soup","source","south","space","spare","spatial","spawn","speak","special","speed","spell","spend","sphere","spice","spider","spike","spin","spirit","split","spoil","sponsor","spoon","sport","spot","spray","spread","spring","spy","square","squeeze","squirrel","stable","stadium","staff","stage","stairs","stamp","stand","start","state","stay","steak","steel","stem","step","stereo","stick","still","sting","stock","stomach","stone","stool","story","stove","strategy","street","strike","strong","struggle","student","stuff","stumble","style","subject","submit","subway","success","such","sudden","suffer","sugar","suggest","suit","summer","sun","sunny","sunset","super","supply","supreme","sure","surface","surge","surprise","surround","survey","suspect","sustain","swallow","swamp","swap","swarm","swear","sweet","swift","swim","swing","switch","sword","symbol","symptom","syrup","system","table","tackle","tag","tail","talent","talk","tank","tape","target","task","taste","tattoo","taxi","teach","team","tell","ten","tenant","tennis","tent","term","test","text","thank","that","theme","then","theory","there","they","thing","this","thought","three","thrive","throw","thumb","thunder","ticket","tide","tiger","tilt","timber","time","tiny","tip","tired","tissue","title","toast","tobacco","today","toddler","toe","together","toilet","token","tomato","tomorrow","tone","tongue","tonight","tool","tooth","top","topic","topple","torch","tornado","tortoise","toss","total","tourist","toward","tower","town","toy","track","trade","traffic","tragic","train","transfer","trap","trash","travel","tray","treat","tree","trend","trial","tribe","trick","trigger","trim","trip","trophy","trouble","truck","true","truly","trumpet","trust","truth","try","tube","tuition","tumble","tuna","tunnel","turkey","turn","turtle","twelve","twenty","twice","twin","twist","two","type","typical","ugly","umbrella","unable","unaware","uncle","uncover","under","undo","unfair","unfold","unhappy","uniform","unique","unit","universe","unknown","unlock","until","unusual","unveil","update","upgrade","uphold","upon","upper","upset","urban","urge","usage","use","used","useful","useless","usual","utility","vacant","vacuum","vague","valid","valley","valve","van","vanish","vapor","various","vast","vault","vehicle","velvet","vendor","venture","venue","verb","verify","version","very","vessel","veteran","viable","vibrant","vicious","victory","video","view","village","vintage","violin","virtual","virus","visa","visit","visual","vital","vivid","vocal","voice","void","volcano","volume","vote","voyage","wage","wagon","wait","walk","wall","walnut","want","warfare","warm","warrior","wash","wasp","waste","water","wave","way","wealth","weapon","wear","weasel","weather","web","wedding","weekend","weird","welcome","west","wet","whale","what","wheat","wheel","when","where","whip","whisper","wide","width","wife","wild","will","win","window","wine","wing","wink","winner","winter","wire","wisdom","wise","wish","witness","wolf","woman","wonder","wood","wool","word","work","world","worry","worth","wrap","wreck","wrestle","wrist","write","wrong","yard","year","yellow","you","young","youth","zebra","zero","zone","zoo"],K=new m.default(m.default.givenProvider),M=function(){function e(e,t,r,s){if(this.account_passwords={},this.account_ciphertexts={},this.disable_address=!1,this.account_signatures="",this.setting_path=e,this.account_labels=t,0!==t.length){if(r){if(t.length!==r.length)throw new Error("account_labels should have same length for account_passwords");for(var o=0;o<t.length;o++){if(!this.checkPassword(t[o],r[o].trim()))throw new Error("account_passwords is not correct");this.account_passwords[t[o]]=r[o].trim()}}s&&(this.disable_address=s),this.reload()}}return e.prototype.isLogin=function(e){return e in this.account_passwords},e.prototype.reloadAccount=function(){this.reload()},e.prototype.getAccountLabel=function(e){var t=null;for(var r in this.account_ciphertexts)r.toLocaleLowerCase().includes(e.toLocaleLowerCase())&&(t=r);return null===t?null:{account_address:t,account_label:this.account_ciphertexts[t].account_label}},e.prototype.login=function(e,t){return this.checkPassword(e,t)?(this.account_passwords[e]=t,this.account_labels.push(e),this.reload(),{status:!0,output:"Login success"}):{status:!1,output:"Password is not correct"}},e.prototype.getAccounts=function(e){var t=this.getAccountSignature();t!==this.account_signatures&&(this.account_signatures=t,this.reload());for(var r=Object.keys(this.account_ciphertexts),s=[],o=0;o<r.length;o++)this.getAccountChainType(r[o])===e&&s.push(r[o]);return s},e.prototype.checkAccountLabelIsExist=function(e){return E(this.setting_path,[e])},e.prototype.checkAccountIsExist=function(e){return(e=this.getAccountChecksumAddress(e))in this.account_ciphertexts||(this.reload(),e in this.account_ciphertexts)},e.prototype.checkPassword=function(e,t){var r=f.join(this.setting_path,"accounts/".concat(e,".json"));if(!j(r))return!1;var s,o=A(r);s="PK"===o.account_type?S({salt:t},o.data[0].ciphertexts):{slat:t,data:o.pp_ciphertexts};var n=b.SHA256(JSON.stringify(s)).toString();return o.signature===n},e.prototype.showPrivateKey=function(e){if(!this.checkAccountIsExist(e))throw new Error("Account is not exist");e=this.getAccountChecksumAddress(e);var t=this.account_ciphertexts[e],r=this.account_passwords[t.account_label];return T(t.data,r)},e.prototype.getAccountChainType=function(e){return e.startsWith("0x")&&42===e.length?"evm":/^[A-HJ-NP-Za-km-z1-9]*$/.test(e)?"solana":"unknown"},e.prototype.generatePKAccount=function(e,t,r,s,o){if(o&&this.checkAccountLabelIsExist(e))throw new Error("Account labels already exist");if(!o&&!this.account_passwords[e])throw new Error("Password is not correct");o||(r=this.account_passwords[e]);var n,i=q(t,r);try{n=this.getAccountAddressByPrivateKey(t,s)}catch(e){return{status:!1,output:e.message}}var a={address:n,data:i},c=S({salt:r},a),l={signature:b.SHA256(JSON.stringify(c)).toString(),account_type:"PK",tag:"",ciphertexts:a};return o||(this.account_passwords[e]=r,this.account_labels.push(e)),{status:!0,output:l}},e.prototype.generatePPAccount=function(e,t,r){if(this.checkAccountLabelIsExist(e))return{status:!1,output:"Account labels already exist"};var s=q(t,r),o={slat:r,data:s},n=b.SHA256(JSON.stringify(o)).toString(),i=this.getSubAccount("evm",t,0);if(!1===i.status)return{status:!1,output:i.output};var a=this.getSubAccount("solana",t,0);if(!1===a.status)return{status:!1,output:a.output};var c={signature:n,account_type:"PP",pp_ciphertexts:s,tag:"",data:[{ciphertexts:{evm:{address:i.output.address,data:q(i.output.pk,r)},solana:{address:a.output.address,data:q(a.output.pk,r)}}}]};return this.account_passwords[e]=r,this.account_labels.push(e),{status:!0,output:c}},e.prototype.generateSubAccount=function(e,t){if(!this.checkAccountLabelIsExist(e))return{status:!1,output:"Account labels not exist"};var r=f.join(this.setting_path,"accounts/".concat(e,".json")),s=A(r).pp_ciphertexts,o=T(s,this.account_passwords[e]),n=this.getSubAccount("evm",o,t);if(!1===n.status)return{status:!1,output:n.output};var i=this.getSubAccount("solana",o,t);return!1===i.status?{status:!1,output:i.output}:{status:!0,output:{evm:{address:n.output.address,data:q(n.output.pk,this.account_passwords[e])},solana:{address:i.output.address,data:q(i.output.pk,this.account_passwords[e])}}}},e.prototype.resetPassword=function(e,t){if(!this.checkAccountLabelIsExist(e))return{status:!1,output:"Account labels not exist"};if(!this.checkPassword(e,this.account_passwords[e]))return{status:!1,output:"account passwords is not correct"};var r=f.join(this.setting_path,"accounts/".concat(e,".json")),s=A(r);if("PK"===s.account_type){for(var o=s.data,n=0;n<o.length;n++){var i=o[n].ciphertexts.data,a=T(i,this.account_passwords[e]);o[n].ciphertexts.data=q(a,t)}var c=S({salt:t},s.data[0].ciphertexts);return s.signature=b.SHA256(JSON.stringify(c)).toString(),C(s,r),delete this.account_passwords[e],{status:!0,output:"Password reset successfully"}}var l=T(s.pp_ciphertexts,this.account_passwords[e]);s.pp_ciphertexts=q(l,t);var u={slat:t,data:s.pp_ciphertexts};s.signature=b.SHA256(JSON.stringify(u)).toString();var p=s.data;for(n=0;n<p.length;n++){var d=T(p[n].ciphertexts.evm.data,this.account_passwords[e]);p[n].ciphertexts.evm.data=q(d,t);var h=T(p[n].ciphertexts.solana.data,this.account_passwords[e]);p[n].ciphertexts.solana.data=q(h,t)}return C(s,r),delete this.account_passwords[e],{status:!0,output:"Password reset successfully"}},e.prototype.signTransaction=function(e,t,r){return e=this.getAccountChecksumAddress(e),this.checkAccountIsExist(e)?"unknown"===this.getAccountChainType(e)?{status:!1,output:"Chain type unknown"}:"evm"===this.getAccountChainType(e)?this.signEvmTransaction(t,r):this.signSolanaTransaction(e,r,t):{status:!1,output:"Account is not exist"}},e.prototype.sendSignedTransaction=function(e,t,r){return e=this.getAccountChecksumAddress(e),this.checkAccountIsExist(e)?"unknown"===this.getAccountChainType(e)?{status:!1,output:"Chain type unknown"}:"evm"===this.getAccountChainType(e)?this.sendEvmTransaction(t,r):this.sendSolanaTransaction(t,r):{status:!1,output:"Account is not exist"}},e.prototype.signMessage=function(e,t){return e=this.getAccountChecksumAddress(e),this.checkAccountIsExist(e)?"unknown"===this.getAccountChainType(e)?{status:!1,output:"Chain type unknown"}:"evm"===this.getAccountChainType(e)?{status:!0,output:this.signEvmMessage(t,e)}:{status:!0,output:this.signSolanaMessage(t,e)}:{status:!1,output:"Account is not exist"}},e.prototype.simulateTransaction=function(e,t,r){return k(this,void 0,void 0,function(){var s,o,n;return x(this,function(i){switch(i.label){case 0:return s=new a.Connection(t),o=this.showPrivateKey(e),n=a.Keypair.fromSecretKey(v.decode(o)),[4,_(s.simulateTransaction.bind(s),[r,[n]])];case 1:return[2,i.sent()]}})})},e.prototype.signEvmTransaction=function(e,t){return k(this,void 0,void 0,function(){var r,s,o,n;return x(this,function(i){switch(i.label){case 0:return this.account_passwords?(r=e.from,e.gas?[3,2]:[4,new P(t).getEvmGasLimit(e,t)]):[2,{status:!1,output:"Please set password first"}];case 1:if(!(s=i.sent()).status)return[2,s];e.gas=s.output,i.label=2;case 2:return e.gasPrice?[3,4]:[4,new P(t).getEvmGasPrice()];case 3:if(!(s=i.sent()).status)return[2,s];e.gasPrice=s.output,i.label=4;case 4:return o=this.showPrivateKey(r),n=new m.default(t),[4,_(n.eth.accounts.signTransaction.bind(n.eth.accounts),[e,o])];case 5:return[2,i.sent()]}})})},e.prototype.sendEvmTransaction=function(e,t){return k(this,void 0,void 0,function(){var r;return x(this,function(s){switch(s.label){case 0:return r=new m.default(t),[4,_(r.eth.sendSignedTransaction.bind(r.eth),[e])];case 1:return[2,s.sent()]}})})},e.prototype.signSolanaTransaction=function(e,t,r){return k(this,void 0,void 0,function(){var s,o,n,i,l;return x(this,function(u){switch(u.label){case 0:return s=this.showPrivateKey(e),o=a.Keypair.fromSecretKey(v.decode(s)),n=new c.Wallet(o),"recentBlockhash"in r&&r.recentBlockhash?[3,2]:(i=new a.Connection(t),[4,_(i.getLatestBlockhash.bind(i),[])]);case 1:if(!(l=u.sent()).status)return[2,{status:!1,output:"Failed to get latest blockhash"}];r.recentBlockhash=l.output.blockhash,u.label=2;case 2:return r.feePayer=n.publicKey,[4,_(n.signTransaction.bind(n),[r])];case 3:return[2,u.sent()]}})})},e.prototype.sendSolanaTransaction=function(e,t){return k(this,void 0,void 0,function(){var r;return x(this,function(s){switch(s.label){case 0:return r=new a.Connection(t),[4,_(r.sendRawTransaction.bind(r),[e.serialize()])];case 1:return[2,s.sent()]}})})},e.prototype.signEvmMessage=function(e,t){var r=this.showPrivateKey(t);return K.eth.accounts.sign(e,r).signature},e.prototype.signSolanaMessage=function(e,t){var r=this.showPrivateKey(t),s=y.sign.detached(new Uint8Array(e.match(/.{1,2}/g).map(function(e){return parseInt(e,16)})),v.decode(r));return v.encode(s)},e.prototype.checkIsDisableAddress=function(e,t){if(!e||!this.disable_address)return!1;for(var r=e.length,s=0;s<r;s++){var o=e[s].from,n=e[s].to;if(t>=o&&t<=n)return!0}return!1},e.prototype.reload=function(){if(this.account_labels=I(this.setting_path,this.account_labels),!E(this.setting_path,this.account_labels))throw new Error("Account labels not exist");for(var e={},t=this.account_labels.length,r=0;r<t;r++){var s=f.join(this.setting_path,"accounts/".concat(this.account_labels[r],".json"));if(g.existsSync(s)){var o=JSON.parse(g.readFileSync(s,"utf8"));if("PK"!==o.account_type){var n=o.data.length,i=o.disabled_slots;for(l=0;l<n;l++)this.checkIsDisableAddress(i,l)||(e[o.data[l].ciphertexts.evm.address]={account_label:this.account_labels[r],data:o.data[l].ciphertexts.evm.data},e[o.data[l].ciphertexts.solana.address]={account_label:this.account_labels[r],data:o.data[l].ciphertexts.solana.data})}else{var a=o.data;if(!a)continue;for(var c=a.length,l=0;l<c;l++)e[a[l].ciphertexts.address]={account_label:this.account_labels[r],data:a[l].ciphertexts.data}}}}this.account_ciphertexts=e},e.prototype.getAccountChecksumAddress=function(e){return"evm"===this.getAccountChainType(e)&&(e=K.utils.toChecksumAddress(e)),e},e.prototype.getAccountAddressByPrivateKey=function(e,t){return"evm"===this.getNetworkTypeByChainId(t)?K.eth.accounts.privateKeyToAccount(e).address:a.Keypair.fromSecretKey(v.decode(e)).publicKey.toBase58()},e.prototype.getNetworkTypeByChainId=function(e){return"901"===e||"902"===e||"903"===e?"solana":"evm"},e.prototype.getSubAccount=function(e,t,r){if(!function(e){var t=e.split(/\s+/g),r=t.length;if(12!==r&&24!==r)return!1;for(var s=0;s<r;s++)if(!O.includes(t[s]))return!1;return!0}(t))return{status:!1,output:"Please set correct mnemonic"};if("solana"===e){var s=w.mnemonicToSeedSync(t),o=p.HDKey.fromMasterSeed(s),n=a.Keypair.fromSeed(o.derive("m/44'/501'/".concat(r,"'/0'")).privateKey);return{status:!0,output:{address:n.publicKey.toBase58(),pk:v.encode(n.secretKey)}}}if("evm"===e){s=w.mnemonicToSeedSync(t);var i=(o=u.hdkey.fromMasterSeed(s)).derivePath("m/44'/60'/0'/0").deriveChild(r).getWallet();return{status:!0,output:{address:K.utils.toChecksumAddress(i.getAddressString()),pk:i.getPrivateKeyString()}}}return{status:!1,output:"Unknown chain type"}},e.prototype.getAccountSignature=function(){for(var e=this.account_labels.length,t=[],r=0;r<e;r++){var s=f.join(this.setting_path,"accounts/".concat(this.account_labels[r],".json")),o=g.readFileSync(s,"utf8");t.push(o)}return b.MD5(JSON.stringify(t)).toString()},e}(),D=ue,L=function(){function e(e,t,r,s){this.account=new M(e,t,r,s)}return e.version=D.version,e}();e.WativeCore=L,Object.defineProperty(e,"__esModule",{value:!0})}(t,A.default,$.default,O.default,D.default,L.default,H.default,K.default,z.default,N.default,R.default,F.default)}(0,le.exports);class pe{constructor(e,t){this.runningServices=new Map,this.configManager=new W(e,t),this.pidDir=E.join(this.configManager.getKeystorePath(),"ssh","pids"),this.ensurePidDir(),this.setupLogger()}ensurePidDir(){I.existsSync(this.pidDir)||I.mkdirSync(this.pidDir,{recursive:!0})}async isPortInUse(e,t="127.0.0.1"){return new Promise(r=>{const s=B.createServer();s.listen(e,t,()=>{s.once("close",()=>{r(!1)}),s.close()}),s.on("error",e=>{"EADDRINUSE"===e.code?r(!0):r(!1)})})}getPidFilePath(e){return E.join(this.pidDir,`${e}.pid`)}writePidFile(e,t){const r=this.getPidFilePath(e);I.writeFileSync(r,t.toString())}readPidFile(e){const t=this.getPidFilePath(e);if(!I.existsSync(t))return null;try{const e=I.readFileSync(t,"utf8").trim();return parseInt(e,10)}catch(e){return null}}removePidFile(e){const t=this.getPidFilePath(e);I.existsSync(t)&&I.unlinkSync(t)}isProcessRunning(e){try{return process.kill(e,0),!0}catch(e){return!1}}async startService(e,t){if(this.runningServices.has(e))throw new Error(`Service '${e}' is already running.`);const r=this.configManager.loadServiceConfig(e);if(await this.isPortInUse(r.ssh.port,r.ssh.listen)){const t=`Port ${r.ssh.port} on ${r.ssh.listen} is already in use. Cannot start SSH service '${e}'.`;throw this.logger.error(t),console.error(`Error: ${t}`),new Error(t)}this.logger.info(`Port ${r.ssh.port} on ${r.ssh.listen} is available for service '${e}'`);const s=t||await this.promptForPasswords(r.keystore.allowed_keystores),o=await this.configManager.validateKeystorePasswords(r.keystore.allowed_keystores,s),n=Object.entries(o).filter(([e,t])=>!t).map(([e,t])=>e);if(n.length>0)throw new Error(`Invalid passwords for keystores: ${n.join(", ")}`);const i=this.createServerInstance(r,s);i.listen(r.ssh.listen,r.ssh.port),this.writePidFile(e,process.pid),this.logger.info(`SSH service '${e}' started on ${r.ssh.listen}:${r.ssh.port}`),console.log(`SSH service '${e}' is now running in the background on ${r.ssh.listen}:${r.ssh.port}`);const a={config:r,passwords:s,server:i};this.runningServices.set(e,a),this.setupServiceLogger(e)}async stopService(e){const t=this.runningServices.get(e),r=this.readPidFile(e),s=E.join(this.pidDir,`${e}-daemon.pid`),o=E.join(this.pidDir,`${e}-watcher.pid`);let n=null,i=null;if(I.existsSync(s)){const e=I.readFileSync(s,"utf8").trim();e&&(n=parseInt(e))}if(I.existsSync(o)){const e=I.readFileSync(o,"utf8").trim();e&&(i=parseInt(e))}if(t)t.server&&t.server.close&&t.server.close(),this.runningServices.delete(e);else if(i&&this.isProcessRunning(i))try{process.kill(i,"SIGTERM"),setTimeout(()=>{this.isProcessRunning(i)&&process.kill(i,"SIGKILL");try{I.existsSync(o)&&I.unlinkSync(o),I.existsSync(s)&&I.unlinkSync(s)}catch(e){}},5e3)}catch(e){if(n&&this.isProcessRunning(n))try{process.kill(n,"SIGTERM"),setTimeout(()=>{this.isProcessRunning(n)&&process.kill(n,"SIGKILL")},5e3)}catch(e){}try{I.existsSync(o)&&I.unlinkSync(o),I.existsSync(s)&&I.unlinkSync(s)}catch(e){}}else if(n&&this.isProcessRunning(n))try{process.kill(n,"SIGTERM"),setTimeout(()=>{this.isProcessRunning(n)&&process.kill(n,"SIGKILL")},5e3),I.existsSync(s)&&I.unlinkSync(s)}catch(e){}else{if(!r||!this.isProcessRunning(r))throw new Error(`Service '${e}' is not running.`);try{process.kill(r,"SIGTERM"),setTimeout(()=>{this.isProcessRunning(r)&&process.kill(r,"SIGKILL")},5e3)}catch(e){}}this.removePidFile(e),this.logger.info(`SSH service '${e}' stopped.`)}async restartService(e,t){this.runningServices.has(e)&&await this.stopService(e),await this.startService(e,t)}getRunningServices(){return Array.from(this.runningServices.keys())}getServiceConfig(e){return this.configManager.loadServiceConfig(e)}getServiceStatus(e){if(this.runningServices.has(e))return"running";try{this.configManager.loadServiceConfig(e);const t=E.join(this.pidDir,`${e}-daemon.pid`);if(I.existsSync(t)){const e=I.readFileSync(t,"utf8").trim();if(e){const r=parseInt(e);if(this.isProcessRunning(r))return"running";I.unlinkSync(t)}}const r=this.readPidFile(e);return r&&this.isProcessRunning(r)?"running":(r&&this.removePidFile(e),"stopped")}catch(e){return"not_found"}}async stopAllServices(){const e=Array.from(this.runningServices.keys());for(const t of e)await this.stopService(t)}async createService(e,t,r,s,o){return this.configManager.createServiceConfig(e,t,r,s,o)}async removeService(e){this.runningServices.has(e)&&await this.stopService(e),console.log("serviceName:",e),this.configManager.removeServiceConfig(e),this.logger.info(`Service '${e}' removed.`)}listServices(){return this.configManager.listServiceConfigs().map(e=>{const t=this.getServiceStatus(e);let r,s;try{const t=this.configManager.loadServiceConfig(e);r=t.ssh.port,s=t.description}catch(e){}return{name:e,status:t,port:r,description:s}})}updateServiceKeystores(e,t){this.configManager.updateServiceConfig(e,{keystore:{path:this.configManager.loadServiceConfig(e).keystore.path,allowed_keystores:t}})}async promptForPasswords(e){const t={};for(const r of e){let e,s=!1,o=0;const n=3;for(;!s&&o<n;){e=await G(`Enter password for keystore [${r}]`);try{const i=this.configManager.getKeystorePath();if(s=new le.exports.WativeCore(i,[r]).account.checkPassword(r,e),s){t[r]=e;break}if(o++,!(o<n))throw new Error(`Failed to authenticate keystore [${r}] after ${n} attempts.`);console.log(`Invalid password for ${r}`)}catch(e){if(o++,!(o<n))throw new Error(`Failed to authenticate keystore [${r}] after ${n} attempts: ${e.message}`);console.log("Error validating password for keystore")}}}return t}createServerInstance(e,t){const r=e.clients;if(0===r.length)throw new Error("No clients configured for service");if(r.length>1)throw new Error("Only one client is supported for this service");const s=JSON.parse(r[0]),o=[s.name],n=[s.public_key_path],i=[s.allowed_keystores],a=e.keystore.allowed_keystores;if(0===a.length)throw new Error("No keystores configured for service");let c=[];for(const e of a)c.push(t[e]);return new ae(e.server_keys.private_key_path,e.server_keys.passphrase,o,n,i,e.keystore.path,a,c)}async showLogs(e,t=50,r=!1){const o=process.env.HOME+"/.wative/logs";let n;if(n=e?E.join(o,`${e}.log`):E.join(o,"service_manager.log"),!I.existsSync(n))throw new Error(`Log file not found: ${n}`);const i=r?["-f",`-n${t}`,n]:[`-n${t}`,n],a=s.spawn("tail",i,{stdio:["ignore","inherit","inherit"]});return r?(process.on("SIGINT",()=>{a.kill("SIGTERM"),process.exit(0)}),new Promise((e,t)=>{a.on("close",r=>{0===r?e():t(new Error(`tail process exited with code ${r}`))})})):new Promise((e,t)=>{a.on("close",r=>{0===r?e():t(new Error(`tail process exited with code ${r}`))})})}setupLogger(){const e=process.env.HOME+"/.wative/logs";I.existsSync(e)||I.mkdirSync(e,{recursive:!0}),M.configure({appenders:{file:{type:"file",filename:E.join(e,"service_manager.log"),maxLogSize:10485760,backups:3,compress:!0,keepFileExt:!0,layout:{type:"pattern",pattern:"%d{yyyy-MM-dd hh:mm:ss.SSS} [%p] %c - %m"},encoding:"utf-8"},console:{type:"console"}},categories:{default:{appenders:["file","console"],level:"info"}}}),this.logger=M.getLogger("service_manager"),this.logger.level="info"}setupServiceLogger(e){const t=process.env.HOME+"/.wative/logs";I.existsSync(t)||I.mkdirSync(t,{recursive:!0});const r=E.join(t,`${e}.log`);this.cleanupOldLogs(t),M.configure({appenders:{file:{type:"file",filename:E.join(t,"service_manager.log"),maxLogSize:10485760,backups:3,compress:!0,keepFileExt:!0,layout:{type:"pattern",pattern:"%d{yyyy-MM-dd hh:mm:ss.SSS} [%p] %c - %m"},encoding:"utf-8"},console:{type:"console"},[`${e}_file`]:{type:"file",filename:r,maxLogSize:10485760,backups:3,compress:!0,keepFileExt:!0,layout:{type:"pattern",pattern:"%d{yyyy-MM-dd hh:mm:ss.SSS} [%p] %c - %m"},encoding:"utf-8"}},categories:{default:{appenders:["file","console"],level:"info"},[e]:{appenders:[`${e}_file`],level:"info"}}})}cleanupOldLogs(e){try{const t=I.readdirSync(e),r=new Date;r.setDate(r.getDate()-3),t.forEach(t=>{const s=E.join(e,t);I.statSync(s).mtime<r&&t.endsWith(".log")&&(I.unlinkSync(s),this.logger.info(`Deleted old log file: ${t}`))})}catch(e){this.logger.warn(`Failed to cleanup old logs: ${e}`)}}}const de=new r.Command,he=require("../package.json");let ge;de.version(he.version).description("Wative CLI Tool"),de.command("version").description("Show the version of wative").action(()=>{console.log(`Wative CLI Tool v${he.version}`)});const fe=()=>{if(!ge){const e=E.join(process.env.HOME||"",".wative","ssh");ge=new pe(e)}return ge},me=de.command("ssh").description("Manage SSH services");me.command("start").description("Start SSH service").option("-c, --config <name>","Specify service configuration name").option("-d, --daemon","Run service in daemon mode").action(async e=>{const t=fe();try{e.config||(console.error("Error: Configuration name is required. Use -c or --config to specify a service configuration."),process.exit(1));const r=e.config,o=t.getServiceConfig(r),n=require("net"),i=async(e,t="127.0.0.1")=>new Promise(r=>{const s=n.createServer();s.listen(e,t,()=>{s.once("close",()=>{r(!1)}),s.close()}),s.on("error",e=>{"EADDRINUSE"===e.code?r(!0):r(!1)})});if(await i(o.ssh.port,o.ssh.listen)){const e=`Port ${o.ssh.port} on ${o.ssh.listen} is already in use. Cannot start SSH service '${r}'.`;console.error(`Error: ${e}`),process.exit(1)}if(console.log(`Port ${o.ssh.port} on ${o.ssh.listen} is available for service '${r}'`),e.daemon){console.log(`Starting SSH service '${r}' in daemon mode...`);const e=await t.promptForPasswords(o.keystore.allowed_keystores),n=require("crypto"),i=n.randomBytes(32),a=n.randomBytes(16),c=n.createCipheriv("aes-256-cbc",i,a);let l=c.update(JSON.stringify(e),"utf8","hex");l+=c.final("hex");const u=a.toString("hex")+":"+i.toString("hex")+":"+l;return void((e,t)=>{const r=E.join(process.env.HOME||"",".wative","logs"),o=E.join(process.env.HOME||"",".wative","ssh","pids");I.existsSync(r)||I.mkdirSync(r,{recursive:!0}),I.existsSync(o)||I.mkdirSync(o,{recursive:!0});const n=E.join(r,`${e}-daemon.log`),i=E.join(o,`${e}-daemon.pid`),a=E.join(o,`${e}-watcher.pid`),c=s.spawn("node",[E.resolve(__dirname,"daemon-watcher.js"),e,n,i,a,E.resolve(__dirname,"..")],{detached:!0,stdio:"ignore",env:{...process.env,WATIVE_ENCRYPTED_PASSWORDS:t}});I.writeFileSync(a,c.pid.toString()),c.unref(),console.log(`SSH service '${e}' daemon watcher started with PID: ${c.pid}`),console.log(`Daemon log file: ${n}`),console.log(`Watcher PID file: ${a}`)})(r,u)}if(process.env.WATIVE_DAEMON_PASSWORDS&&process.env.WATIVE_WORKER_MODE){const e=require("crypto"),t=process.env.WATIVE_DAEMON_PASSWORDS;delete process.env.WATIVE_DAEMON_PASSWORDS,delete process.env.WATIVE_WORKER_MODE;try{const s=t.split(":"),o=Buffer.from(s[0],"hex"),n=Buffer.from(s[1],"hex"),i=s[2],a=e.createDecipheriv("aes-256-cbc",n,o);let c=a.update(i,"hex","utf8");c+=a.final("utf8");const l=JSON.parse(c);console.log(`[${(new Date).toISOString()}] Worker process starting SSH service '${r}'...`);const u=fe();await u.startService(r,l);for(const e in l)l[e]=null,delete l[e];console.log(`[${(new Date).toISOString()}] SSH service '${r}' started successfully`);const p=async e=>{console.log(`[${(new Date).toISOString()}] Worker received ${e}, stopping service...`);try{await u.stopService(r),console.log(`[${(new Date).toISOString()}] Service stopped successfully`)}catch(e){console.error(`[${(new Date).toISOString()}] Error stopping service:`,e)}process.exit(0)};process.on("SIGTERM",()=>p("SIGTERM")),process.on("SIGINT",()=>p("SIGINT"));const d=setInterval(async()=>{try{const e=await u.getServiceStatus(r);"running"!==e&&(console.log(`[${(new Date).toISOString()}] Service status changed to: ${e}`),"stopped"===e&&(console.log(`[${(new Date).toISOString()}] Service stopped unexpectedly, exiting worker...`),clearInterval(d),process.exit(1)))}catch(e){console.error(`[${(new Date).toISOString()}] Error checking service status:`,e)}},3e4),h=setInterval(()=>{},6e4),g=()=>{clearInterval(d),clearInterval(h)};process.on("exit",g)}catch(e){console.error(`[${(new Date).toISOString()}] Worker process error:`,e),process.exit(1)}return}{await t.startService(r),console.log(`SSH service '${r}' started successfully`),process.on("SIGINT",async()=>{console.log("\nReceived SIGINT, stopping services..."),await t.stopAllServices(),process.exit(0)}),process.on("SIGTERM",async()=>{console.log("\nReceived SIGTERM, stopping services..."),await t.stopAllServices(),process.exit(0)});const e=setInterval(()=>{"running"!==t.getServiceStatus(r)&&(console.log(`Service ${r} is no longer running, exiting...`),clearInterval(e),process.exit(1))},5e3);process.stdin.resume()}}catch(e){console.error(`Error: ${e instanceof Error?e.message:String(e)}`),process.exit(1)}}),me.command("stop").description("Stop SSH service").option("-c, --config <name>","Specify service configuration name").action(async e=>{const t=fe();try{e.config||(console.error("Error: Configuration name is required. Use -c or --config to specify a service configuration."),process.exit(1)),await t.stopService(e.config),console.log(`SSH service '${e.config}' stopped successfully`)}catch(e){console.error(`Error: ${e instanceof Error?e.message:String(e)}`),process.exit(1)}}),me.command("restart").description("Restart SSH service").option("-c, --config <name>","Specify service configuration name").action(async e=>{const t=fe();try{e.config||(console.error("Error: Configuration name is required. Use -c or --config to specify a service configuration."),process.exit(1)),await t.restartService(e.config),console.log(`SSH service '${e.config}' restarted successfully`)}catch(e){console.error(`Error: ${e instanceof Error?e.message:String(e)}`),process.exit(1)}}),me.command("create").description("Create new SSH service configuration interactively").action(async()=>{const e=require("readline"),t=require("fs"),r=require("path"),s=e.createInterface({input:process.stdin,output:process.stdout}),o=e=>new Promise(t=>{s.question(e,t)});try{console.log("SSH create command started...");const e=r.join(process.env.HOME||"",".wative/ssh"),s=(await o(`SSH storage located in (default: ${e}): `)).trim()||e,n=r.join(process.env.HOME||"",".wative"),i=(await o(`Keystore storage located in (default: ${n}): `)).trim()||n,a=new W(s,i);let c,l,u,p;for(;;)if(c=await o("Enter service name: "),c=U(c),c.trim()){if(!a.serviceIsExist(c))break;console.log("Service name already exists, please enter a different name")}else console.log("Service name cannot be empty");for(;;){const e=await o("Enter port number: ");if(l=parseInt(e),isNaN(l)||l<1024||l>65535){console.log("Port number must be between 1024-65535");continue}const t=a.listServiceConfigs();let r=!1;for(const e of t)try{if(a.loadServiceConfig(e).ssh.port===l){r=!0;break}}catch(e){}if(!r)break;console.log(`Port ${l} is already in use by another service, please enter a different port`)}for(;;){const e=await o("Enter open keystore slugs (comma separated): ");if(!e.trim()){console.log("Keystore list cannot be empty");continue}if(u=e.split(",").map(e=>e.trim()).filter(e=>e),0===u.length){console.log("At least one valid keystore is required");continue}const s=r.join(i,"accounts");let n=!0;for(const e of u){const o=r.join(s,`${e}.json`);if(!t.existsSync(o)){console.log(`Keystore '${e}' does not exist`),n=!1;break}}if(n){console.log("All keystores verified to exist");break}console.log("Please re-enter valid keystore list")}for(;;){if(p=await o("Enter remote client name: "),p=U(p),p.trim()){console.log(`Client name: ${p}`);break}console.log("Client name cannot be empty")}const d=r.join(s,"conf.d",c);t.existsSync(d)||t.mkdirSync(d,{recursive:!0});const h=r.join(d,`${p}.pub`);for(console.log("\nPlease place the remote client's public key file at the following path:"),console.log(`${h}`),console.log("\nPress Enter to continue after placing the file...");;){if(await o(""),t.existsSync(h)){console.log("Client public key file found");break}console.log("Client public key file not found, please confirm the file is correctly placed and press Enter again")}const g=await o("Enter service description (optional): ");console.log("\nCreating SSH service configuration...");const f=await a.createServiceConfig(c,l,u,p,g||void 0);console.log("\nNote: Passwords will be requested when starting the service."),console.log(`\nSSH service configuration '${c}' created successfully!`),console.log(`Port: ${l}`),console.log(`Allowed keystores: ${u.join(", ")}`),console.log(`Client name: ${p}`),console.log(`Server private key: ${f.server_keys.private_key_path}`),console.log(`Client public key: ${h}`)}catch(e){console.error(`Error: ${e instanceof Error?e.message:String(e)}`),process.exit(1)}finally{s.close()}}),me.command("remove").description("Remove SSH service configuration").option("-c, --config <name>","Service configuration name").action(async e=>{const t=fe();try{e.config||(console.error("Error: Configuration name is required for remove command"),process.exit(1)),await t.removeService(e.config),console.log(`SSH service configuration '${e.config}' removed successfully`)}catch(e){console.error(`Error: ${e instanceof Error?e.message:String(e)}`),process.exit(1)}}),me.command("list").description("List all SSH service configurations").action(async()=>{const e=new W,t=new pe,r=e.listServiceConfigs();if(0!==r.length){console.log("SSH Service Configurations:");for(const s of r)try{const r=e.loadServiceConfig(s),o=t.getServiceStatus(s);console.log(` - ${s}: ${r.description||"No description"} (${o})`)}catch(e){const r=t.getServiceStatus(s);console.log(` - ${s}: Configuration error (${r})`)}}else console.log("No SSH service configurations found.")}),me.command("status").description("Show SSH service status").option("-c, --config <name>","Service configuration name").action(async e=>{const t=fe();try{if(e.config){const r=t.getServiceStatus(e.config);console.log(`SSH service '${e.config}' status: ${r}`)}else{const e=t.listServices();if(0===e.length)return void console.log("No SSH service configurations found");console.log("SSH Service Status:"),e.forEach(e=>{const r=t.getServiceStatus(e.name);console.log(` - ${e.name}: ${r}`)})}}catch(e){console.error(`Error: ${e instanceof Error?e.message:String(e)}`),process.exit(1)}}),me.command("log").description("Show SSH service logs").option("-c, --config <name>","Service configuration name").option("-n, --lines <number>","Number of lines to show (default: 50)","50").option("-f, --follow","Follow log output").action(async e=>{const t=fe();try{const r=parseInt(e.lines)||50;await t.showLogs(e.config,r,e.follow)}catch(e){console.error(`Error: ${e instanceof Error?e.message:String(e)}`),process.exit(1)}}),de.command("cmd").description("Start wallet-cli shell").action(async()=>{try{s.execSync("wallet-cli",{stdio:"inherit"})}catch(e){}}),(require.main===module||process.argv[1]&&(process.argv[1].includes("bin/wative.js")||process.argv[1].includes("wative")||process.argv[1].includes("ssh")))&&de.parse(process.argv),e.program=de,Object.defineProperty(e,"__esModule",{value:!0})});
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "wative",
3
- "version": "1.1.20",
3
+ "version": "1.2.0",
4
4
  "description": "An agile keystore management toolkit",
5
5
  "main": "lib/index.umd.js",
6
6
  "scripts": {
@@ -108,6 +108,11 @@ export class SSHConfigManager {
108
108
  return this.parseConfigData(configData);
109
109
  }
110
110
 
111
+ public serviceIsExist(serviceName: string): boolean {
112
+ const configPath = this.getServiceConfigPath(serviceName);
113
+ return fs.existsSync(path.dirname(configPath));
114
+ }
115
+
111
116
  /**
112
117
  * 获取所有服务配置列表
113
118
  */
@@ -133,13 +138,10 @@ export class SSHConfigManager {
133
138
  */
134
139
  public removeServiceConfig(serviceName: string): void {
135
140
  const configPath = this.getServiceConfigPath(serviceName);
136
-
137
- if (fs.existsSync(configPath)) {
138
- fs.unlinkSync(configPath);
141
+ const configDir = path.dirname(configPath);
142
+ if (fs.existsSync(configDir)) {
143
+ fs.rmSync(configDir, { recursive: true });
139
144
  }
140
-
141
- // 删除相关的密钥文件
142
- this.removeServiceKeys(serviceName);
143
145
  }
144
146
 
145
147
  /**
@@ -299,19 +301,4 @@ export class SSHConfigManager {
299
301
  }
300
302
  };
301
303
  }
302
-
303
- private removeServiceKeys(serviceName: string): void {
304
- const keyPatterns = [
305
- `id_rsa_${serviceName}_server`,
306
- `id_rsa_${serviceName}_server.pub`,
307
- `id_rsa_${serviceName}_*`
308
- ];
309
-
310
- for (const pattern of keyPatterns) {
311
- const keyPath = path.join(this.configDir, pattern);
312
- if (fs.existsSync(keyPath)) {
313
- fs.unlinkSync(keyPath);
314
- }
315
- }
316
- }
317
304
  }
@@ -394,6 +394,7 @@ export class SSHServiceManager {
394
394
  await this.stopService(serviceName);
395
395
  }
396
396
 
397
+ console.log("serviceName:", serviceName);
397
398
  this.configManager.removeServiceConfig(serviceName);
398
399
  this.logger.info(`Service '${serviceName}' removed.`);
399
400
  }
package/src/wative.ts CHANGED
@@ -5,6 +5,7 @@ import { SSHServiceManager } from './ssh/service_manager';
5
5
  import { SSHConfigManager } from './ssh/config_manager';
6
6
  import * as fs from 'fs';
7
7
  import { spawn } from 'child_process';
8
+ import { getKeystoreSlugByAccountName } from './utils';
8
9
 
9
10
  const program = new Command();
10
11
  const packageJson = require('../package.json');
@@ -360,11 +361,12 @@ sshCommand
360
361
  let serviceName: string;
361
362
  while (true) {
362
363
  serviceName = await question('Enter service name: ');
364
+ serviceName = getKeystoreSlugByAccountName(serviceName);
365
+
363
366
  if (serviceName.trim()) {
364
- try {
365
- configManager.loadServiceConfig(serviceName);
367
+ if (configManager.serviceIsExist(serviceName)) {
366
368
  console.log('Service name already exists, please enter a different name');
367
- } catch {
369
+ } else {
368
370
  break; // Service doesn't exist, can use this name
369
371
  }
370
372
  } else {
@@ -408,7 +410,7 @@ sshCommand
408
410
  let allowedKeystores: string[];
409
411
 
410
412
  while (true) {
411
- const keystoresStr = await question('Enter allowed keystore list (comma separated): ');
413
+ const keystoresStr = await question('Enter open keystore slugs (comma separated): ');
412
414
  if (!keystoresStr.trim()) {
413
415
  console.log('Keystore list cannot be empty');
414
416
  continue;
@@ -445,7 +447,10 @@ sshCommand
445
447
  let clientName: string;
446
448
  while (true) {
447
449
  clientName = await question('Enter remote client name: ');
450
+ clientName = getKeystoreSlugByAccountName(clientName);
451
+
448
452
  if (clientName.trim()) {
453
+ console.log(`Client name: ${clientName}`);
449
454
  break;
450
455
  } else {
451
456
  console.log('Client name cannot be empty');